{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"i-sell-it":{"_type":"localeString","en":"I sell it","ru":"I sell it"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"en":"Selling","ru":"Продают","_type":"localeString"},"using":{"en":"Using","ru":"Используют","_type":"localeString"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"supplier-popover":{"_type":"localeString","en":"supplier","ru":"поставщик"},"implementation-popover":{"en":"deployment","ru":"внедрение","_type":"localeString"},"vendor-popover":{"en":"vendor","ru":"производитель","_type":"localeString"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"en":"Rating descending","ru":"По убыванию рейтинга","_type":"localeString"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"_type":"localeString","en":"Rebate descending","ru":"По убыванию скидки"},"i-use-it-popover":{"_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика."},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"rebate-for-poc":{"ru":"Бонус 4 POC","_type":"localeString","en":"Bonus 4 POC"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"vendor-verified":{"en":"Vendor verified","ru":"Поставщик потверждён","_type":"localeString"},"program-sends-data":{"en":"Program sends data","_type":"localeString"},"learn-more-btn":{"en":"Learn more","ru":"Узнать больше","_type":"localeString"},"categories-popover":{"ru":"категории","_type":"localeString","en":"categories"},"sort-popular-asc":{"_type":"localeString","en":"Popular ascending","ru":"По возростанию популярности"},"sort-popular-desc":{"ru":"По убыванию популярности","_type":"localeString","en":"Popular descending"},"no-results":{"_type":"localeString","en":"No results found. We didn't find any results with the filter you selected.","ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос."},"login":{"de":"Einloggen","ru":"Войти","_type":"localeString","en":"Login"},"register":{"en":"Register","de":"Registrieren","ru":"Зарегистрироваться","_type":"localeString"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You need to register or login.","de":"Sie müssen sich registrieren oder anmelden"},"add-to-comparison":{"en":"Add to comparison","ru":"Добавить в сравнение","_type":"localeString"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"items-found":{"ru":"Продуктов найдено","_type":"localeString","en":"Products found"},"sort-sales-desc":{"ru":"По продаже","_type":"localeString","en":"By sale"},"sort-purchases-desc":{"en":"By purchase","ru":"По покупке","_type":"localeString"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product producer"},"products-fetching-error":{"ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString","en":"An error has occurred. Please reload the page."}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"_type":"localeString","en":"About us","de":"Über uns","ru":"О нас"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"_type":"localeString","en":"Received ROI","ru":"Полученный ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"_type":"localeString","en":"from","ru":"от"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"en":"Filter by price","ru":"Фильтр по цене","_type":"localeString"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"en":"Sorting","ru":"Сортировка","_type":"localeString"},"category":{"ru":"Категория","_type":"localeString","en":"Category"},"follow":{"en":"Follow","ru":"Следить","_type":"localeString"},"add-product":{"_type":"localeString","en":"Add Product","ru":"Добавить продукт"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"ru":"Очистить","_type":"localeString","en":"Сlear"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"_type":"localeString","en":"product categories","ru":"категориz продуктаhjle"},"providers-field":{"ru":"Поставщик, производитель","_type":"localeString","en":"Providers"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"roi-calculator-checkbox":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"apply-filter-button":{"ru":"Применить фильтр","_type":"localeString","en":"Apply filter"},"sorting-toggle":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"show-all-button":{"_type":"localeString","en":"Show all","ru":"Показать все"},"suggest-product-button":{"en":"Suggest product","ru":"Предложить продукт","_type":"localeString"},"with-projects-label":{"_type":"localeString","en":"With deployments","ru":"С внедрениями"},"bonus-4-reference":{"en":"Bonus 4 Reference","ru":"Бонус за референс","_type":"localeString"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"ru":"Страны","_type":"localeString","en":"Countries"},"seller":{"en":"Seller","ru":"Продавец","_type":"localeString"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"_type":"localeString","en":"User suppliers","ru":"Поставщики пользователя"},"business-process":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"_type":"localeString","en":"Users","ru":"Пользователи"},"status":{"_type":"localeString","en":"Status","ru":"Статус"},"info-source":{"en":"Info source","ru":"Информационный ресурс","_type":"localeString"},"with-reference-checkbox":{"en":"With reference","ru":"С референсами","_type":"localeString"},"show-deal-checkbox":{"ru":"Показывать сделки с noname","_type":"localeString","en":"Show deal with noname"},"roi-checkbox":{"_type":"localeString","en":"ROI","ru":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"_type":"localeString","en":"Try AI (Beta)","ru":"Попробовать AI (Beta)"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"_type":"localeString","en":"Add deployment","ru":"Добавить внедрение"},"sort-title-asc":{"en":"From A to Z","ru":"От А до Я","_type":"localeString"},"sort-title-desc":{"_type":"localeString","en":"From Z to A","ru":"От Я до А"},"sellers-field":{"en":"Sellers","ru":"Поставщики, Производители","_type":"localeString"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"en":"With comments","ru":"С комментариями","_type":"localeString"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"en":"Partners","ru":" Партнеры","_type":"localeString"},"customers":{"ru":"Покупатели","_type":"localeString","en":"Customers"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"en":"Product vendor","ru":"Производитель продукта","_type":"localeString"},"implementation-date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"_type":"localeString","en":"Deal canceled","ru":"Сделка отменена"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"en":"Deal is planned","ru":"Сделка планируется","_type":"localeString"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"_type":"localeString","en":"In Process","ru":"Ведется"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"competencies":{"_type":"localeString","en":"Competencies","ru":"Компетенции"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"label":"catalog-products-text-block","body":{"en":[{"style":"normal","_key":"8bebcfb34955","markDefs":[],"children":[{"marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.","_key":"8bebcfb349550","_type":"span"}],"_type":"block"}],"ru":[{"_type":"block","style":"normal","_key":"28241882db7a","markDefs":[],"children":[{"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0","_type":"span","marks":[]}]}],"_type":"localeBlock"}}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"title":{"_type":"localeString","en":"ROI4CIO: Products","ru":"ROI4CIO: Продукты"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}],"translatable_meta":[{"name":"og:title","translations":{"_type":"localeString","en":"Products","ru":"Продукты"}},{"name":"description","translations":{"ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString","en":"Description"}},{"translations":{"en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString"},"name":"og:description"},{"translations":{"_type":"localeString","en":"keyword","ru":"каталог, программное обеспечение, софт, ит услуги"},"name":"keywords"},{"name":"title","translations":{"ru":"Продукты","_type":"localeString","en":"Products"}}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"micro-focus-fortify-on-demand":{"id":3545,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Micro_Focus_Fortify_on_Demand.jpg","logo":true,"scheme":false,"title":"Micro Focus Fortify on Demand","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"micro-focus-fortify-on-demand","companyTitle":"Micro Focus (NetIQ)","companyTypes":["supplier","vendor"],"companyId":4461,"companyAlias":"micro-focus-netiq","description":"<span style=\"font-weight: bold; \">Micro Focus Fortify on Demand</span> delivers application security as a service, providing customers with the security testing, vulnerability management, expertise, and support needed to easily create, supplement, and expand a Software Security Assurance program.\r\n<span style=\"font-weight: bold; \">Complete software security assurance</span>\r\nOur application security as a service integrates static, dynamic and mobile AppSec testing with continuous monitoring for web apps in production.\r\n<span style=\"font-weight: bold; \">Superior quality of results</span>\r\nVulnerability rule packs are regularly updated to protect web, mobile, and thick client applications from the latest threats.\r\n<span style=\"font-weight: bold; \">Dedicated technical team supports you</span>\r\nWe combine industry-leading software with a team of experts that deliver optimization, results review, and false positive removal as part of global 24/7 support.\r\n<span style=\"font-weight: bold; \">Scalable for application growth</span>\r\nSolution can be delivered in a flexible cloud or hybrid to align with application demand. Only Fortify offers the flexibility of SaaS, on-premises or hybrid deployment of both.\r\n<span style=\"font-weight: bold;\">Industry-leading developer training</span>\r\nEmpowers developers to code securely with integrated eLearning courses and gamified learning programs.","shortDescription":"Fortify on Demand - integrated secure development, security testing and continuous monitoring.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Micro Focus Fortify on Demand","keywords":"","description":"<span style=\"font-weight: bold; \">Micro Focus Fortify on Demand</span> delivers application security as a service, providing customers with the security testing, vulnerability management, expertise, and support needed to easily create, supplement, and expand a","og:title":"Micro Focus Fortify on Demand","og:description":"<span style=\"font-weight: bold; \">Micro Focus Fortify on Demand</span> delivers application security as a service, providing customers with the security testing, vulnerability management, expertise, and support needed to easily create, supplement, and expand a","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Micro_Focus_Fortify_on_Demand.jpg"},"eventUrl":"","translationId":3546,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":5,"title":"Security Software","alias":"security-software","description":" Computer security software or cybersecurity software is any computer program designed to enhance information security. Security software is a broad term that encompasses a suite of different types of software that deliver data and computer and network security in various forms. \r\nSecurity software can protect a computer from viruses, malware, unauthorized users and other security exploits originating from the Internet. Different types of security software include anti-virus software, firewall software, network security software, Internet security software, malware/spamware removal and protection software, cryptographic software, and more.\r\nIn end-user computing environments, anti-spam and anti-virus security software is the most common type of software used, whereas enterprise users add a firewall and intrusion detection system on top of it. \r\nSecurity soft may be focused on preventing attacks from reaching their target, on limiting the damage attacks can cause if they reach their target and on tracking the damage that has been caused so that it can be repaired. As the nature of malicious code evolves, security software also evolves.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Firewall. </span>Firewall security software prevents unauthorized users from accessing a computer or network without restricting those who are authorized. Firewalls can be implemented with hardware or software. Some computer operating systems include software firewalls in the operating system itself. For example, Microsoft Windows has a built-in firewall. Routers and servers can include firewalls. There are also dedicated hardware firewalls that have no other function other than protecting a network from unauthorized access.\r\n<span style=\"font-weight: bold; \">Antivirus.</span> Antivirus solutions work to prevent malicious code from attacking a computer by recognizing the attack before it begins. But it is also designed to stop an attack in progress that could not be prevented, and to repair damage done by the attack once the attack abates. Antivirus software is useful because it addresses security issues in cases where attacks have made it past a firewall. New computer viruses appear daily, so antivirus and security software must be continuously updated to remain effective.\r\n<span style=\"font-weight: bold; \">Antispyware.</span> While antivirus software is designed to prevent malicious software from attacking, the goal of antispyware software is to prevent unauthorized software from stealing information that is on a computer or being processed through the computer. Since spyware does not need to attempt to damage data files or the operating system, it does not trigger antivirus software into action. However, antispyware software can recognize the particular actions spyware is taking by monitoring the communications between a computer and external message recipients. When communications occur that the user has not authorized, antispyware can notify the user and block further communications.\r\n<span style=\"font-weight: bold; \">Home Computers.</span> Home computers and some small businesses usually implement security software at the desktop level - meaning on the PC itself. This category of computer security and protection, sometimes referred to as end-point security, remains resident, or continuously operating, on the desktop. Because the software is running, it uses system resources, and can slow the computer's performance. However, because it operates in real time, it can react rapidly to attacks and seek to shut them down when they occur.\r\n<span style=\"font-weight: bold; \">Network Security.</span> When several computers are all on the same network, it's more cost-effective to implement security at the network level. Antivirus software can be installed on a server and then loaded automatically to each desktop. However firewalls are usually installed on a server or purchased as an independent device that is inserted into the network where the Internet connection comes in. All of the computers inside the network communicate unimpeded, but any data going in or out of the network over the Internet is filtered trough the firewall.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal; \">What is IT security software?</span></h1>\r\nIT security software provides protection to businesses’ computer or network. It serves as a defense against unauthorized access and intrusion in such a system. It comes in various types, with many businesses and individuals already using some of them in one form or another.\r\nWith the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations. Since more and more businesses are now relying their crucial operations on software products, the importance of security system software assurance must be taken seriously – now more than ever. Having reliable protection such as a security software programs is crucial to safeguard your computing environments and data. \r\n<p class=\"align-left\">It is not just the government or big corporations that become victims of cyber threats. In fact, small and medium-sized businesses have increasingly become targets of cybercrime over the past years. </p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal; \">What are the features of IT security software?</span></h1>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Automatic updates. </span>This ensures you don’t miss any update and your system is the most up-to-date version to respond to the constantly emerging new cyber threats.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Real-time scanning.</span> Dynamic scanning features make it easier to detect and infiltrate malicious entities promptly. Without this feature, you’ll risk not being able to prevent damage to your system before it happens.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Auto-clean.</span> A feature that rids itself of viruses even without the user manually removing it from its quarantine zone upon detection. Unless you want the option to review the malware, there is no reason to keep the malicious software on your computer which makes this feature essential.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Multiple app protection.</span> This feature ensures all your apps and services are protected, whether they’re in email, instant messenger, and internet browsers, among others.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application level security.</span> This enables you to control access to the application on a per-user role or per-user basis to guarantee only the right individuals can enter the appropriate applications.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Role-based menu.</span> This displays menu options showing different users according to their roles for easier assigning of access and control.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Row-level (multi-tenant) security.</span> This gives you control over data access at a row-level for a single application. This means you can allow multiple users to access the same application but you can control the data they are authorized to view.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Single sign-on.</span> A session or user authentication process that allows users to access multiple related applications as long as they are authorized in a single session by only logging in their name and password in a single place.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">User privilege parameters.</span> These are customizable features and security as per individual user or role that can be accessed in their profile throughout every application.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application activity auditing.</span> Vital for IT departments to quickly view when a user logged in and off and which application they accessed. Developers can log end-user activity using their sign-on/signoff activities.</li></ul>\r\n<p class=\"align-left\"><br /><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Security_Software.png"},{"id":206,"title":"Application Security Testing","alias":"application-security-testing","description":" Applications form the lifeline of any business today – and they are under attack more than ever before. Where previously we focused our attention on securing organizations’ network parameters, today the application level is where the focus is for attackers.\r\nAccording to Verizon’s 2014 Data Breach Investigations Report, web applications “remain the proverbial punching bag of the internet,” with about 80% of attacks in the application layer, as Gartner has stated. Taking proactive measures to protect your company and customer data is no longer an option: It is a business imperative for enterprises across all industries.\r\nIn 2013, the Ponemon Institute’s ‘Cost of a Data Breach Report’ found that security incidents in the U.S. averaged a total cost of $5.4 million. Preventing just one similar security incident would more than cover the cost of application security and prove your security programs value.\r\nApplication Security is built around the concept of ensuring that the code written for an application does what it was built to do, and keeps the contained data secure.\r\nAccording to Gartner, application security puts a primary focus on three elements:\r\n<ul><li>Reducing security vulnerabilities and risks</li><li>Improving security features and functions such as authentication, encryption or auditing</li><li>Integrating with the enterprise security infrastructure</li></ul>","materialsDescription":" Security testing techniques scour for vulnerabilities or security holes in applications. These vulnerabilities leave applications open to exploitation. Ideally, security testing is implemented throughout the entire software development life cycle (SDLC) so that vulnerabilities may be addressed in a timely and thorough manner. Unfortunately, testing is often conducted as an afterthought at the end of the development cycle. With the growth of Continuous delivery and DevOps as popular software development and deployment models, continuous security models are becoming more popular.\r\nVulnerability scanners, and more specifically web application scanners, otherwise known as penetration testing tools (i.e. ethical hacking tools) have been historically used by security organizations within corporations and security consultants to automate the security testing of http request/responses; however, this is not a substitute for the need for actual source code review. Physical code reviews of an application's source code can be accomplished manually or in an automated fashion. Given the common size of individual programs (often 500,000 lines of code or more), the human brain cannot execute a comprehensive data flow analysis needed in order to completely check all circuitous paths of an application program to find vulnerability points. The human brain is suited more for filtering, interrupting and reporting the outputs of automated source code analysis tools available commercially versus trying to trace every possible path through a compiled code base to find the root cause level vulnerabilities.\r\nThere are many kinds of automated tools for identifying vulnerabilities in applications. Some require a great deal of security expertise to use and others are designed for fully automated use. The results are dependent on the types of information (source, binary, HTTP traffic, configuration, libraries, connections) provided to the tool, the quality of the analysis, and the scope of vulnerabilities covered. Common technologies used for identifying application vulnerabilities include:\r\n<span style=\"font-weight: bold;\">Static Application Security Testing (SAST)</span> is a technology that is frequently used as a Source Code Analysis tool. The method analyzes source code for security vulnerabilities prior to the launch of an application and is used to strengthen code. This method produces fewer false positives but for most implementations requires access to an application's source code and requires expert configuration and lots of processing power.\r\n<span style=\"font-weight: bold;\">Dynamic Application Security Testing (DAST)</span> is a technology, which is able to find visible vulnerabilities by feeding a URL into an automated scanner. This method is highly scalable, easily integrated and quick. DAST's drawbacks lie in the need for expert configuration and the high possibility of false positives and negatives.\r\n<span style=\"font-weight: bold;\">Interactive Application Security Testing (IAST)</span> is a solution that assesses applications from within using software instrumentation. This technique allows IAST to combine the strengths of both SAST and DAST methods as well as providing access to code, HTTP traffic, library information, backend connections and configuration information. Some IAST products require the application to be attacked, while others can be used during normal quality assurance testing.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Application_Security_Testing1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"micro-focus-secure-gateway":{"id":2116,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/micro_focus.png","logo":true,"scheme":false,"title":"Micro Focus Secure Gateway","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"micro-focus-secure-gateway","companyTitle":"Micro Focus (NetIQ)","companyTypes":["supplier","vendor"],"companyId":4461,"companyAlias":"micro-focus-netiq","description":"Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system. This solution is an add-on for Micro Focus Secure Gateway that scans the actual composition of images and videos to ensure accuracy. Its sophisticated probability engine scans incoming and outgoing images, reliably distinguishes between pornographic and non-pornographic content, and stops the inappropriate content from entering or leaving your messaging system.\r\n<span style=\"font-weight: bold;\">The Problem</span>\r\nInappropriate email communications, including pornography and other explicit content, continue to be a major problem in many organizations. This content is often found in unsolicited spam, but it is more commonly generated from employee communications, both inside and outside of the workplace. If these messages go unchecked, organizations could face a number of devastating consequences that can cost time and money:\r\n<ul> <li>Sexual harassment lawsuits</li> <li>Criminal charges</li> <li>A hostile work environment</li> <li>Reputation damage</li> </ul>\r\n<span style=\"font-weight: bold;\">The Micro Focus Solution</span>\r\nOrganizations must address this inappropriate behavior through corporate policies and through the use of technology. Secure Gateway gives you the ability to monitor and block pornographic images, which addresses the primary issue of inappropriate communications.\r\nSecure Gateway screens images before they pass through your email system and takes action when offensive material is detected. It uses sophisticated analytical processes consisting of multiple detection methods to reliably distinguish between pornographic and non-pornographic content, without having to rely on a signature database of pre-categorized content. These processes ensure that pornography is prevented from entering or leaving your messaging system.\r\n<span style=\"font-weight: bold;\">CONFIGURE IMAGE ANALYSIS AUDITING</span>\r\nFollow these instructions to set Secure Gateway into an audit mode. In audit mode, you will locate the images that are passing through your email system. You can use audit mode without interfering with the mail flow.\r\n<span style=\"font-weight: bold;\">PREREQUISITES</span>\r\nTo use Secure Gateway, you must have the following items:\r\n<ul> <li>A pre-installed Micro Focus Secure Gateway server that is configured and actively scanning email</li> <li>An Secure Gateway license key. Either a full license or trial key will work. (Contact your Micro Focus representative for your evaluation key)</li> </ul>","shortDescription":"Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Micro Focus Secure Gateway","keywords":"","description":"Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system. This solution is an add-on for Micro Focus Secure Gateway that scans the actual composition of images and videos to ensure accuracy. Its sophistic","og:title":"Micro Focus Secure Gateway","og:description":"Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system. This solution is an add-on for Micro Focus Secure Gateway that scans the actual composition of images and videos to ensure accuracy. Its sophistic","og:image":"https://old.roi4cio.com/fileadmin/user_upload/micro_focus.png"},"eventUrl":"","translationId":2117,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":38,"title":"Secure E-mail Gateway"}],"testingArea":"","categories":[{"id":558,"title":"Secure E-mail Gateway - Appliance","alias":"secure-e-mail-gateway-appliance","description":"According to technology research firm Gartner, secure email gateways “provide basic message transfer agent functions; inbound filtering of spam, phishing, malicious and marketing emails; and outbound data loss prevention (DLP) and email encryption.”\r\nTo put that in simpler language, a secure email gateway (also called an email security gateway) is a cybersecurity solution that monitors incoming and outgoing messages for suspicious behavior, preventing them from being delivered. Secure email gateways can be deployed via an email server, public cloud, on-premises software, or in a hybrid system. According to cybersecurity experts, none of these deployment options are inherently superior; each one has its own strengths and weaknesses that must be assessed by the individual enterprise.\r\nGartner defines the secure email gateway market as mature, with the key capabilities clearly defined by market demands and customer satisfaction. These capabilities include:\r\n<ul><li>Basic and next-gen anti-phishing and anti-spam</li><li>Additional security features</li><li>Customization of the solution’s management features</li><li>Low false positive and false negative percentages</li><li>External processes and storage</li></ul>\r\nSecure email gateways are designed to surpass the traditional detection capabilities of legacy antivirus and anti-phishing solutions. To do so, they offer more sophisticated detection and prevention capabilities; secure email gateways can make use of threat intelligence to stay up-to-date with the latest threats.\r\nAdditionally, secure email gateways can sandbox suspicious emails, observing their behavior in a safe, enclosed environment that resembles the legitimate network. Security experts can then determine if it is a legitimate threat or a false positive.\r\nSecure email gateway solutions will often offer data loss prevention and email encryption capabilities to protect outgoing communications from prying and unscrupulous eyes.\r\nMuch like SIEM or endpoint detection and response (EDR), secure email gateways can produce false positives and false negatives, although they do tend to be far less than rates found in SIEM and EDR alerts.","materialsDescription":"<span style=\"font-weight: bold;\">How Does a Secure Email Gateway Work?</span>\r\nA secure email gateway offers a robust framework of technologies that protect against email-borne threats. It is effectively a firewall for your email, and scans both outbound and inbound email for any malicious content. At a minimum, most secure gateways offer a minimum of four security features: virus and malware blocking, spam filtering, content filtering and email archiving. Let's take a look at these features in more detail:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Virus and Malware Blocking</span></span>\r\nEmails infected with viruses or malware can make up approximately 1% of all email received by an organization. For a secure email gateway to effectively prevent these emails from reaching their intended recipients and delivering their payload, it must scan each email and be constantly kept up-to-date with the latest threat patterns and characteristics.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Spam Filtering</span></span>\r\nBelieve it or not, spam filtering is where the majority of a secure email gateway's processing power is focused. Spam is blocked in a number of different ways. Basic spam filtering usually involves a prefiltering technology that blocks or quarantines any emails received from known spammers. Spam filtering can also detect patterns commonly found in spam emails, such as preferred keywords used by spammers and the inclusion of links that could take the email recipient to a malicious site if clicked. Many email clients also allow users to flag spam messages that arrive in their mailbox and to block senders.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Content Filtering</span></span>\r\nContent filtering is typically applied to an outbound email sent by users within the company. For example, you can configure your secure email gateway to prevent specific sensitive documents from being sent to an external recipient, or put a block on image files or specific keywords within them being sent through the email system.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Email Archiving</span></span>\r\nEmail services, whether they are in the cloud or on-premise, need to be managed efficiently. Storage has been a problem for email administrators for many years, and while you may have almost infinite cloud storage available, email archiving can help to manage both user mailboxes and the efficiency of your systems. Compliance is also a major concern for many companies and email archiving is a must if you need to keep emails for a specific period of time.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Secure_Email_Gateway_Appliance.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":" According to technology research firm Gartner, secure email gateways “provide basic message transfer agent functions; inbound filtering of spam, phishing, malicious and marketing emails; and outbound data loss prevention (DLP) and email encryption.”\r\nTo put that in simpler language, a secure email gateway (also called an email security gateway) is a cybersecurity solution that monitors incoming and outgoing messages for suspicious behavior, preventing them from being delivered. Secure email gateways can be deployed via an email server, public cloud, on-premises software, or in a hybrid system. According to cybersecurity experts, none of these deployment options are inherently superior; each one has its own strengths and weaknesses that must be assessed by the individual enterprise.\r\nGartner defines the secure email gateway market as mature, with the key capabilities clearly defined by market demands and customer satisfaction. These capabilities include:\r\n<ul><li>Basic and Next-Gen Anti-Phishing and Anti-Spam</li><li>Additional Security Features</li><li>Customization of the Solution’s Management Features</li><li>Low False Positive and False Negative Percentages</li><li>External Processes and Storage</li></ul>\r\nSecure email gateways are designed to surpass the traditional detection capabilities of legacy antivirus and anti-phishing solutions. To do so, they offer more sophisticated detection and prevention capabilities; secure email gateways can make use of threat intelligence to stay up-to-date with the latest threats.\r\nAdditionally, SEGs can sandbox suspicious emails, observing their behavior in a safe, enclosed environment that resembles the legitimate network. Security experts can then determine if it is a legitimate threat or a false positive.\r\nSecure email gateway solutions will often offer data loss prevention and email encryption capabilities to protect outgoing communications from prying and unscrupulous eyes.\r\nMuch like SIEM or endpoint detection and response (EDR), secure email gateways can produce false positives and false negatives, although they do tend to be far less than rates found in SIEM and EDR alerts.","materialsDescription":" <span style=\"font-weight: bold;\">How Does a Secure Email Gateway Work?</span>\r\nA secure email gateway offers a robust framework of technologies that protect against these email-borne threats. It is effectively a firewall for your email and scans both outbound and inbound email for any malicious content. At a minimum, most secure gateways offer a minimum of four security features: virus and malware blocking, spam filtering, content filtering and email archiving. Let's take a look at these features in more detail:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Virus and Malware Blocking</span></span>\r\nEmails infected with viruses or malware can make up approximately 1% of all email received by an organization. For a secure email gateway to effectively prevent these emails from reaching their intended recipients and delivering their payload, it must scan every email and be constantly kept up-to-date with the latest threat patterns and characteristics.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Spam Filtering</span></span>\r\nBelieve it or not, spam filtering is where the majority of a secure email gateway's processing power is focused. Spam is blocked in a number of different ways. Basic spam filtering usually involves a prefiltering technology that blocks or quarantines any emails received from known spammers. Spam filtering can also detect patterns commonly found in spam emails, such as preferred keywords used by spammers and the inclusion of links that could take the email recipient to a malicious site if clicked. Many email clients also allow users to flag spam messages that arrive in their mailbox and to block senders.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Content Filtering</span></span>\r\nContent filtering is typically applied to an outbound email sent by users within the company. For example, you can configure your secure email gateway to prevent specific sensitive documents from being sent to an external recipient, or put a block on image files or specific keywords within them being sent through the email system.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Email Archiving</span></span>\r\nEmail services, whether they are in the cloud or on-premise, need to be managed efficiently. Storage has been a problem for email administrators for many years, and while you may have almost infinite cloud storage available, email archiving can help to manage both user mailboxes and the efficiency of your systems. Compliance is also a major concern for many companies and email archiving is a must if you need to keep emails for a certain period of time.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Secure_Email_Gateway.jpg"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"micro-focus-security-arcsight-user-behavior-analytics-uba":{"id":1671,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Micro_Focus.png","logo":true,"scheme":false,"title":"Micro Focus Security ArcSight User Behavior Analytics (UBA)","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"micro-focus-security-arcsight-user-behavior-analytics-uba","companyTitle":"Micro Focus (NetIQ)","companyTypes":["supplier","vendor"],"companyId":4461,"companyAlias":"micro-focus-netiq","description":"Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. It helps detect and investigate malicious user behavior, insider threat and account misuse. Therefore, it enables organizations to detect breaches before significant damage occurs by finding the adversary faster.\r\n<span style=\"font-weight: bold;\">Micro Focus</span><span style=\"font-weight: bold;\"> User behavior Analytics helps you with:</span>\r\n<ul> <li>Lowering the risk and impact of cyber attacks</li> <li>Detect unusual behavior by correlating user identity management with rest of the IT logs from apps and network</li> <li>Achieve faster event resolution to identified threats through deeper integration with SIEM</li> <li>Quick forensics investigation UBA analyzes user related data looking for threats in comparison to peers, historical activity, and/or violations of predefined expected behavior.</li> </ul>","shortDescription":"Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Micro Focus Security ArcSight User Behavior Analytics (UBA)","keywords":"","description":"Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. Micro Focus User Behavior Analytics gives enterprises visibility into their use","og:title":"Micro Focus Security ArcSight User Behavior Analytics (UBA)","og:description":"Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. Micro Focus User Behavior Analytics gives enterprises visibility into their use","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Micro_Focus.png"},"eventUrl":"","translationId":1672,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":30,"title":"UEBA - User and Entity Behavior Analytics"}],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"Developments in UBA technology led Gartner to evolve the category to user and entity behavior analytics (UEBA). In September 2015, Gartner published the Market Guide for User and Entity Analytics by Vice President and Distinguished Analyst, Avivah Litan, that provided a thorough definition and explanation. UEBA was referred to in earlier Gartner reports but not in much depth. Expanding the definition from UBA includes devices, applications, servers, data, or anything with an IP address. It moves beyond the fraud-oriented UBA focus to a broader one encompassing "malicious and abusive behavior that otherwise went unnoticed by existing security monitoring systems, such as SIEM and DLP." The addition of "entity" reflects that devices may play a role in a network attack and may also be valuable in uncovering attack activity. "When end users have been compromised, malware can lay dormant and go undetected for months. Rather than trying to find where the outsider entered, UEBAs allow for quicker detection by using algorithms to detect insider threats."\r\nParticularly in the computer security market, there are many vendors for UEBA applications. They can be "differentiated by whether they are designed to monitor on-premises or cloud-based software as a service (SaaS) applications; the methods in which they obtain the source data; the type of analytics they use (i.e., packaged analytics, user-driven or vendor-written), and the service delivery method (i.e., on-premises or a cloud-based)." According to the 2015 market guide released by Gartner, "the UEBA market grew substantially in 2015; UEBA vendors grew their customer base, market consolidation began, and Gartner client interest in UEBA and security analytics increased." The report further projected, "Over the next three years, leading UEBA platforms will become preferred systems for security operations and investigations at some of the organizations they serve. It will be—and in some cases already is—much easier to discover some security events and analyze individual offenders in UEBA than it is in many legacy security monitoring systems."","materialsDescription":"<span style=\"font-weight: bold;\">What is UEBA?</span>\r\nHackers can break into firewalls, send you e-mails with malicious and infected attachments, or even bribe an employee to gain access into your firewalls. Old tools and systems are quickly becoming obsolete, and there are several ways to get past them.\r\nUser and entity behavior analytics (UEBA) give you more comprehensive way of making sure that your organization has top-notch IT security, while also helping you detect users and entities that might compromise your entire system.\r\nUEBA is a type of cybersecurity process that takes note of the normal conduct of users. In turn, they detect any anomalous behavior or instances when there are deviations from these “normal” patterns. For example, if a particular user regularly downloads 10 MB of files every day but suddenly downloads gigabytes of files, the system would be able to detect this anomaly and alert them immediately.\r\nUEBA uses machine learning, algorithms, and statistical analyses to know when there is a deviation from established patterns, showing which of these anomalies could result in, potentially, a real threat. UEBA can also aggregate the data you have in your reports and logs, as well as analyze the file, flow, and packet information.\r\nIn UEBA, you do not track security events or monitor devices; instead, you track all the users and entities in your system. As such, UEBA focuses on insider threats, such as employees who have gone rogue, employees who have already been compromised, and people who already have access to your system and then carry out targeted attacks and fraud attempts, as well as servers, applications, and devices that are working within your system.\r\n<span style=\"font-weight: bold;\">What are the benefits of UEBA?</span>\r\nIt is the unfortunate truth that today's cybersecurity tools are fast becoming obsolete, and more skilled hackers and cyber attackers are now able to bypass the perimeter defenses that are used by most companies. In the old days, you were secure if you had web gateways, firewalls, and intrusion prevention tools in place. This is no longer the case in today’s complex threat landscape, and it’s especially true for bigger corporations that are proven to have very porous IT perimeters that are also very difficult to manage and oversee.\r\nThe bottom line? Preventive measures are no longer enough. Your firewalls are not going to be 100% foolproof, and hackers and attackers will get into your system at one point or another. This is why detection is equally important: when hackers do successfully get into your system, you should be able to detect their presence quickly in order to minimize the damage.\r\n<span style=\"font-weight: bold;\">How Does UEBA Work?</span>\r\nThe premise of UEBA is actually very simple. You can easily steal an employee’s user name and password, but it is much harder to mimic the person’s normal behavior once inside the network.\r\nFor example, let’s say you steal Jane Doe’s password and user name. You would still not be able to act precisely like Jane Doe once in the system unless given extensive research and preparation. Therefore, when Jane Doe’s user name is logged in to the system, and her behavior is different than that of typical Jane Doe, that is when UEBA alerts start to sound.\r\nAnother relatable analogy would be if your credit card was stolen. A thief can pickpocket your wallet and go to a high-end shop and start spending thousands of dollars using your credit card. If your spending pattern on that card is different from the thief’s, the company’s fraud detection department will often recognize the abnormal spending and block suspicious purchases, issuing an alert to you or asking you to verify the authenticity of a transaction.\r\nAs such, UEBA is a very important component of IT security, allowing you to:\r\n1. Detect insider threats. It is not too far-fetched to imagine that an employee, or perhaps a group of employees, could go rogue, stealing data and information by using their own access. UEBA can help you detect data breaches, sabotage, privilege abuse and policy violations made by your own staff.\r\n2. Detect compromised accounts. Sometimes, user accounts are compromised. It could be that the user unwittingly installed malware on his or her machine, or sometimes a legitimate account is spoofed. UEBA can help you weed out spoofed and compromised users before they can do real harm.\r\n3. Detect brute-force attacks. Hackers sometimes target your cloud-based entities as well as third-party authentication systems. With UEBA, you are able to detect brute-force attempts, allowing you to block access to these entities.\r\n4. Detect changes in permissions and the creation of super users. Some attacks involve the use of super users. UEBA allows you to detect when super users are created, or if there are accounts that were granted unnecessary permissions.\r\n5. Detect breach of protected data. If you have protected data, it is not enough to just keep it secure. You should know when a user accesses this data when he or she does not have any legitimate business reason to access it.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_User_and_Entity_Behavior_Analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"micro-focus-software-development":{"id":2866,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Micro_Focus.png","logo":true,"scheme":false,"title":"Micro Focus Software Development","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"micro-focus-software-development","companyTitle":"Micro Focus (NetIQ)","companyTypes":["supplier","vendor"],"companyId":4461,"companyAlias":"micro-focus-netiq","description":"From mainframe to mobile, we have the portfolio depth and breadth to cover challenges across DevOps, Hybrid IT, Security & Risk, and Predictive Analytics.\r\nWe are a pure-play software company focused from the ground up on building, selling, and supporting software. This focus allows us to deliver on our mission to put customers at the center of innovation and deliver high-quality, enterprise-grade scalable software that our teams can be proud of. We help customers bridge the old and the new by maximizing the ROI on existing software investments and enabling innovation in the new hybrid model for enterprise IT.","shortDescription":"Micro Focus is a pure-play software company focused from the ground up on building, selling, and supporting software.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Micro Focus Software Development","keywords":"","description":"From mainframe to mobile, we have the portfolio depth and breadth to cover challenges across DevOps, Hybrid IT, Security & Risk, and Predictive Analytics.\r\nWe are a pure-play software company focused from the ground up on building, selling, and supporting ","og:title":"Micro Focus Software Development","og:description":"From mainframe to mobile, we have the portfolio depth and breadth to cover challenges across DevOps, Hybrid IT, Security & Risk, and Predictive Analytics.\r\nWe are a pure-play software company focused from the ground up on building, selling, and supporting ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Micro_Focus.png"},"eventUrl":"","translationId":2867,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":601,"title":"Custom Software Development","alias":"custom-software-development","description":" Custom software (also known as bespoke software or tailor-made software) is software that organization for some specific organization or another user. As such, it can be contrasted with the use of software packages developed for the mass market, such as commercial off-the-shelf (COTS) software, or existing free software.\r\nSince custom software is developed for a single customer it can accommodate that customer's particular preferences and expectations. Custom software may be developed in an iterative process, allowing all nuances and possible hidden risks to be taken into account, including issues which were not mentioned in the original requirement specifications (which are, as a rule, never perfect). In particular, the first phase in the software development process may involve many departments, materchode including marketing, engineering, research and development and general management.\r\nLarge companies commonly use custom software for critical functions, including content management, inventory management, customer management, human resource management, or otherwise to fill the gaps present in the existing software packages. Often such software is legacy software, developed before COTS or free software packages offering the required functionality became available.\r\nCustom software development is often considered expensive compared to off-the-shelf solutions or products. This can be true if one is speaking of typical challenges and typical solutions. However, it is not always true. In many cases, COTS software requires customization to correctly support the buyer's operations. The cost and delay of COTS customization can even add up to the expense of developing custom software. Cost is not the only consideration, however, as the decision to opt for custom software often includes the requirement for the purchaser to own the source code, to secure the possibility of future development or modifications to the installed system.\r\nAdditionally, COTS comes with upfront license costs which vary enormously but sometimes run into the millions (in terms of dollars). Furthermore, the big software houses that release COTS products revamp their product very frequently. Thus a particular customization may need to be upgraded for compatibility every two to four years. Given the cost of customization, such upgrades also turn out to be expensive, as a dedicated product release cycle will have to be earmarked for them.\r\nThe decision to build custom software or go for a COTS implementation would usually rest on one or more of the following factors:\r\n<ul><li>Finances - both cost and benefit: The upfront license cost for COTS products mean that a thorough cost-benefit analysis of the business case needs to be done. However it is widely known that large custom software projects cannot fix all three of scope, time/cost and quality constant, so either the cost or the benefits of a custom software project will be subject to some degree of uncertainty - even disregarding the uncertainty around the business benefits of a feature that is successfully implemented.</li><li>Supplier - In the case of COTS, is the supplier likely to remain in business long, and will there be adequate support and customization available? Alternatively, will there be a realistic possibility of getting support and customization from third parties? In the case of custom software, software development may be outsourced or done in-house. If it is outsourced, the question is: is the supplier reputable, and do they have a good track record?</li><li>Time to market: COTS products usually have a quicker time to market</li><li>Size of implementation: COTS comes with standardization of business processes and reporting. For a global or national organization, these can bring in gains in cost savings, efficiency and productivity, if the branch offices are all willing and able to use the same COTS without heavy customizations (which is not always a given).</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">Why is custom software such a large investment?</span>\r\nBuilding a custom web application is a time-consuming endeavor. It takes time to learn the processes of your business, to gather requirements, to flesh out your needs, and to build the software. Put simply, time is money.\r\nWhile it’s a large investment, by investing in custom software, you’ll own the code instead of having a long-term licensing agreement with another software company.\r\n<span style=\"font-weight: bold;\">How could my business benefit from custom software?</span>\r\nA custom business software solution increases process efficiency through process automation. When business processes are properly automated, they minimize the waste in time and resources that the original processes contained.\r\nThink of it this way: with software that already exists, you have to modify your process to meet software capabilities. With custom software, you can build a system around the existing processes you have in place. You took a lot of time to develop those processes, so why should you revamp your business?\r\n<span style=\"font-weight: bold;\">What is IP and how important is it that I own it?</span>\r\nIP stands for Intellectual Property. When you deal with anything creative, you have to think about copyright and the intellectual property on that work and that includes the creation of software code.\r\nThis gets back to the question of buying vs. building. If there is an existing solution that can suit your needs just fine, then it makes sense to buy, but the software developer owns the code and you are basically licensing the software from there. However, if you need a specialized solution that is customized to your needs and decide to go the custom development route, then the question of who owns the code is an important one.\r\n<span style=\"font-weight: bold;\">I’m thinking about hiring someone offshore; what should I watch out for?</span>\r\nIn short, everything. Language barriers and lack of proximity lead to breakdowns in communication and quality. Do yourself a favor and stay local.\r\nOn a related note, if you’re thinking about hiring for the position internally, think about this: it takes around three people to complete a successful custom software project. If you hire someone internally, their salary might cost what it would take to build with us, and you get a whole team when you work with us. Plus, if your software developer decides to leave, they take their knowledge with them. If one of our team members leave, our whole team shares the knowledge so you’re not left in the dark.\r\n<span style=\"font-weight: bold;\">If things don’t go well, am I sunk?</span>\r\nWe make communication and transparency are top priorities so this doesn’t happen. Right out of the gate we work hard to make sure that not only the project is a good fit, but the relationship with the client is as well. Through each step of the process and the build, we keep you in the loop weekly so you know what to expect and what is happening, but a good development company should have places in their process/relationship where you can cleanly exit. Make sure you know what the process is for leaving and what those different ‘leaving’ options are.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Custom_Software_Development.png"},{"id":32,"title":"IT outsourcing","alias":"it-outsourcing","description":"<span style=\"font-weight: bold; \">IT outsourcing</span> is the use of external service providers to effectively deliver IT-enabled business process, application service and infrastructure solutions for business outcomes.\r\nOutsourcing, which also includes utility services, software as a service and cloud-enabled outsourcing, helps clients to develop the right sourcing strategies and vision, select the right IT service providers, structure the best possible contracts, and govern deals for sustainable win-win relationships with external providers.\r\nOutsourcing can enable enterprises to reduce costs, accelerate time to market, and take advantage of external expertise, assets and/or intellectual property. IT outsourcing can be implemented both ways: outsides or within the country. \r\nIT outsourcing vendors can provide either a fully managed service, meaning they take full responsibility of all IT maintenance and support, or they can provide additional support for an internal IT team when needed, which is known as co-sourced IT support. A company using IT outsourcing can choose to use one provider for all their IT functions or split the work among multiple providers. \r\n<span style=\"font-weight: bold;\">Specific IT services typically outsourced include:</span>\r\n<ul><li>Application development</li><li>Web hosting</li><li>Application support</li><li>Database development</li><li>Telecommunications</li><li>Networking</li><li>Disaster recovery</li><li>Security</li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Reasons for Outsourcing</span></p>\r\n<span style=\"font-weight: bold; \">To Reduce Cost.</span> More often than not, outsourcing means saving money. This is often due to lower labor costs, cheaper infrastructure, or an advantageous tax system in the outsourcing location.<br /><span style=\"font-weight: bold; \">To Access Skills That Are Unavailable Locally.</span> Resources that are scarce at home can sometimes be found in abundance elsewhere, meaning you can easily reach them through outsourcing.<br /><span style=\"font-weight: bold; \">To Better Use Internal Resources</span>. By delegating some of your business processes to a third party, you’ll give your in-house employees the opportunity to focus on more meaningful tasks.<br /><span style=\"font-weight: bold; \">To Accelerate Business Processes.</span> When you stop wasting time on mundane, time-consuming processes, you’ll be able to move forward with your core offering a lot faster.<br /><span style=\"font-weight: bold; \">To Share Risks.</span> When you delegate a part of non-focus functionality by outsourcing it to a third-party vendor, you give away the responsibility and related risks.","materialsDescription":"<h3 class=\"align-center\">What are the Types of IT Outsourcing?</h3>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Project-Based Model.</span> The client hires a team to implement the part of work that is already planned and defined. The project manager from the outsourced team carries full responsibility for the quality and performance of the project.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Dedicated Team Model.</span> The client hires a team that will create a project for them, and they will work only on that project. Unlike the project-based model, a dedicated team is more engaged in your project. In this model, an outsourced team becomes your technical and product advisor. So it can offer ideas and suggest alternative solutions.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Outstaff Model.</span> It's a type of outsourcing in IT when you don't need a full-fledged development team and hire separate specialists. Sometimes the project requires finding a couple of additional professionals, and you're free to hire outstaff workers to cover that scope of work.</p>\r\n<h3 class=\"align-center\"><span style=\"font-weight: bold; \">What are IT Outsourcing examples?</span></h3>\r\nThe individual or company that becomes your outsourcing partner can be located anywhere in the world — one block away from your office or on another continent.\r\nA Bay Area-based startup partnering with an app development team in Utah and a call center in the Philippines, or a UK-based digital marketing agency hiring a Magento developer from Ukraine are both examples of outsourcing.\r\n<h3 class=\"align-center\">Why You Should Use IT Outsourcing</h3>\r\nNow that you know what IT outsourcing is, its models, and types, it's time to clarify why you need to outsource and whether you really need it. Let's go over a few situations that suggest when to opt for IT outsourcing.\r\n<ul><li><span style=\"font-weight: bold;\">You are a domain expert with idea</span></li></ul>\r\nIf you're an industry expert with the idea that solves a real problem, IT outsourcing is your choice. In this case, your main goal is to enter the market and test the solution fast. An outsourced team will help you validate the idea, build an MVP to check the hypothesis, and implement changes in your product according to market needs. It saves you money, time and lets you reach the goal.\r\n<ul><li><span style=\"font-weight: bold;\">You have an early-stage startup</span></li></ul>\r\nIt's a common case that young startups spend money faster than they get a solid team and a ready-to-market product. The Failory found that financial problems are the 3rd reason why startup fails. So it makes more sense to reduce costs by hiring an outsourced team of professionals while your business lives on investor's money. You may employ a full-cycle product development studio covering all the blind spots and bringing your product to life.\r\n<ul><li><span style=\"font-weight: bold;\">You need a technical support</span></li></ul>\r\nEven if you already have a ready solution, but it demands some technical improvements – frameworks for backend components, new language, integrations with enterprise software, UX&UI design – it makes more sense to find an experienced partner. There are many functions that IT outsourcing can cover, and again it saves you the time you'd otherwise spend on looking for qualified staff.<br /><br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IT_outsourcing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"netiq-identity-access-management":{"id":1950,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Micro_Focus__NetIQ_.jpg","logo":true,"scheme":false,"title":"NetIQ Identity & Access Management","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":2,"alias":"netiq-identity-access-management","companyTitle":"Micro Focus (NetIQ)","companyTypes":["supplier","vendor"],"companyId":4461,"companyAlias":"micro-focus-netiq","description":"<span style=\"font-weight: bold;\">Consistently enforce access rights across your business environment</span> Your business needs immediate, easy and secure access to information. But you must balance that with access controls that secure protected information and help you meet government mandates. With Identity-Powered Access solutions, you can quickly and cost-effectively integrate Identity and Access Management (IAM) policies across local, mobile and cloud environments. Our solutions use integrated identity information to create, modify, and retire identities and control their access. We provide Identity Management, Access Management, single sign-on (SSO), access governance, identity tracking and Active Directory (AD) administration. <span style=\"font-weight: bold;\">Give users quick and secure access to the resources they need</span> I need to balance the need to quickly revoke access with enabling immediate access to IT resources. How can I easily and quickly grant secure access to the correct people, both in the Cloud and in the enterprise? <span style=\"font-weight: bold;\">Make passwords secure and simple to remember</span> My users have to remember and use too many passwords. This leads to expensive reset calls, risks exposure from reuse, and causes user frustration. How can I enable a seamless single sign-on (SSO) experience across the enterprise and the Cloud? <span style=\"font-weight: bold;\">Make it easy to gain access to IT resources</span> When users need access to resources, the approvals need to happen quickly so those users can remain productive. How can I make it easier for users or managers to request, review and approve secure access to resources, no matter where they reside? <span style=\"font-weight: bold;\">Govern access for regulatory compliance</span> I need to demonstrate compliance with regulations or mandates that require controls to enforce least privilege access to sensitive information. Current certification processes are a burden on IT and the business. How can I more efficiently demonstrate access controls that limit access to only those that need it? <span style=\"font-weight: bold;\">Control and monitor privileged users</span> We are challenged to grant 'just enough' access and authority for people to do their jobs. Without fine-grained role or access control, we end up granting more rights or access than we should. How can I grant and enforce least privileges? <span style=\"font-weight: bold;\">Strengthen authentication without restricting productivity</span> My users' passwords are too easily compromised, and I deal with a growing list of requirements for stronger authentication to satisfy our security needs. How can I increase the security of access while keeping it easy for all of my users so they aren't burdened with an unwieldy environment? <span style=\"font-weight: bold;\">Identity-Powered Security</span> NetIQ can help you to achieve Identity-Powered Security by providing the tools you need to aggregate identity information from across your IT infrastructure, and integrate this information into your security monitoring tools, delivering the essential \"identity context\" teams need to recognize and address- potential attacks faster than ever before thought possible.","shortDescription":"NetIQ Identity & Access Management is a solution, you can quickly and cost-effectively integrate Identity and Access Management (IAM) policies across local, mobile and cloud environments.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"NetIQ Identity & Access Management","keywords":"","description":"<span style=\"font-weight: bold;\">Consistently enforce access rights across your business environment</span> Your business needs immediate, easy and secure access to information. But you must balance that with access controls that secure protected information a","og:title":"NetIQ Identity & Access Management","og:description":"<span style=\"font-weight: bold;\">Consistently enforce access rights across your business environment</span> Your business needs immediate, easy and secure access to information. But you must balance that with access controls that secure protected information a","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Micro_Focus__NetIQ_.jpg"},"eventUrl":"","translationId":1951,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":46,"title":"IAM - Identity and Access Management"}],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"<span style=\"font-weight: bold; \">Identity management</span> (IdM), also known as <span style=\"font-weight: bold; \">identity and access management</span> (IAM or IdAM), is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of IT security and Data Management.\r\nWith an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Identity and access management software offers role-based access control, which lets system administrators regulate access to systems or networks based on the roles of individual users within the enterprise. In this context, access is the ability of an individual user to perform a specific task, such as view, create or modify a file. Roles are defined according to job competency, authority and responsibility within the enterprise.\r\nSystems used for identity and access management include single sign-on systems, multi-factor authentication and privileged access management (PAM). These technologies also provide the ability to securely store identity and profile data as well as data governance functions to ensure that only data that is necessary and relevant is shared. IAM systems can be deployed on premises, provided by a third-party vendor through a cloud-based subscription model or deployed in a hybrid cloud.\r\n<span style=\"font-weight: bold; \">Basic components of IAM.</span> On a fundamental level, IAM encompasses the following components:\r\n<ul><li>How individuals are identified in a system.</li><li>How roles are identified in a system and how they are assigned to individuals.</li><li>Adding, removing and updating individuals and their roles in a system.</li><li>Assigning levels of access to individuals or groups of individuals.</li><li>Protecting the sensitive data within the system and securing the system itself.</li></ul>\r\nAccess identity management system should consist of all the necessary controls and tools to capture and record user login information, manage the enterprise database of user identities and orchestrate the assignment and removal of access privileges. That means that systems used for IAM should provide a centralized directory service with oversight as well as visibility into all aspects of the company user base.\r\nTechnologies for identity access and management should simplify the user provisioning and account setup process. User access management software should reduce the time it takes to complete these processes with a controlled workflow that decreases errors as well as the potential for abuse while allowing automated account fulfillment. An identity and access management system should also allow administrators to instantly view and change access rights.\r\nIAM systems should be used to provide flexibility to establish groups with specific privileges for specific roles so that access rights based on employee job functions can be uniformly assigned. Identity access management software should also provide request and approval processes for modifying privileges because employees with the same title and job location may need customized, or slightly different, access.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between identity and access management?</span></h1>\r\nAfter authentication, there needs to be an access control decision. The decision is based on the information available about the user. The difference between identity management and access management is thus:\r\n<ul><li>Identity Management is about managing the attributes related to the user.</li><li>Access Management is about evaluating the attributes based on policies and making Yes/No decisions.</li></ul>\r\nThere are three types of Access Control Systems: \r\n<ul><li>Discretionary Access Control (DAC)</li><li>Mandatory Access Control (MAC)</li><li>Role-Based Access Control (RBAC)</li></ul>\r\n<h1 class=\"align-center\">What are the main benefits of identity management?</h1>\r\nIdentity access and management are useful in many ways: it ensures regulatory compliance, enables cost savings, and simplifies the lives of your customers by enhancing their experience. These are the main benefits of having an IAM solution:\r\n<ul><li><span style=\"font-weight: bold; \">Easily accessible anywhere</span></li></ul>\r\nNowadays, people need their identities all the time to use services and resources. In that sense, they require access to any platform without limits using their IDs, thus eliminating barriers for customers to enter the platform anytime, anywhere.\r\n<ul><li><span style=\"font-weight: bold; \">It encourages the connection between the different parts</span></li></ul>\r\nThe digital transformation that is taking place among more and more organizations forces the need for people, applications and devices to stay connected to each other. And, as expected, all of these processes bring with them some security threats.\r\nHowever, IAM software is a solution that guarantees correct administration with the best identity providers, such as Salesforce, Twitter and Google. Authentication and security are two of the strengths of Identity and Access Management, as well as being extendable and ready for future advances. \r\n<ul><li><span style=\"font-weight: bold; \">It improves productivity</span></li></ul>\r\nIdentity software automates the entry of new personnel and facilitates access to all components of the system with which the company operates. This allows reducing times in the delivery of access so that they begin to produce immediately. For this reason, business agility is also increased by using the advantages that technology makes available to meet the demands of today’s world. \r\n<ul><li><span style=\"font-weight: bold; \">It optimizes user experience</span></li></ul>\r\nRemembering so many usernames and passwords to access social networks, banks and other services on the Internet becomes a challenge for people. Thanks to user identity management system, people can get an identity that provides access to different systems. Single sign-on (SSO) allows customers and partners to access different internal and external applications with the same access method. That way the user experience will not be affected.\r\n<ul><li><span style=\"font-weight: bold; \">Secure your brand at all levels</span></li></ul>\r\nThere will be no risk of security breach, regardless of whether a connection is made from multiple identity providers. Identity management software and access management software enables strong authentication to keep your business and brand secure. Detailed verification of all identities entering the system is performed, in addition to allowing various licenses to limit access levels. At the same time, it monitors through analysis, fraud detection and alert functions that indicate a possible real risk. In short, enterprise identity management system is a reliable tool that employs technology to support digital transformation. A software that provides agility, security and satisfaction to the company’s customers. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IAM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["micro-focus-fortify-on-demand","micro-focus-secure-gateway","micro-focus-security-arcsight-user-behavior-analytics-uba","micro-focus-software-development","netiq-identity-access-management"]},"links":{"first":"http://apis.roi4cio.com/api/products?page=1","last":"http://apis.roi4cio.com/api/products?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://apis.roi4cio.com/api/products","per_page":20,"to":5,"total":5},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"30":{"id":30,"title":"UEBA - User and Entity Behavior Analytics"},"38":{"id":38,"title":"Secure E-mail Gateway"},"46":{"id":46,"title":"IAM - Identity and Access Management"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}