{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"en":"Offer a reference bonus","ru":"Предложить бонус за референс","_type":"localeString"},"configurator":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"i-sell-it":{"en":"I sell it","ru":"I sell it","_type":"localeString"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"ru":"Продают","_type":"localeString","en":"Selling"},"using":{"_type":"localeString","en":"Using","ru":"Используют"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"supplier-popover":{"en":"supplier","ru":"поставщик","_type":"localeString"},"implementation-popover":{"_type":"localeString","en":"deployment","ru":"внедрение"},"vendor-popover":{"en":"vendor","ru":"производитель","_type":"localeString"},"sort-title-desc":{"en":"From Z to A","ru":"от Я до А","_type":"localeString"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"ru":"По убыванию рейтинга","_type":"localeString","en":"Rating descending"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"en":"Rebate descending","ru":"По убыванию скидки","_type":"localeString"},"i-use-it-popover":{"_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика."},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"rebate-for-poc":{"_type":"localeString","en":"Bonus 4 POC","ru":"Бонус 4 POC"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"vendor-verified":{"en":"Vendor verified","ru":"Поставщик потверждён","_type":"localeString"},"program-sends-data":{"_type":"localeString","en":"Program sends data"},"learn-more-btn":{"ru":"Узнать больше","_type":"localeString","en":"Learn more"},"categories-popover":{"ru":"категории","_type":"localeString","en":"categories"},"sort-popular-asc":{"en":"Popular ascending","ru":"По возростанию популярности","_type":"localeString"},"sort-popular-desc":{"ru":"По убыванию популярности","_type":"localeString","en":"Popular descending"},"no-results":{"_type":"localeString","en":"No results found. We didn't find any results with the filter you selected.","ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос."},"login":{"ru":"Войти","_type":"localeString","en":"Login","de":"Einloggen"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register","de":"Registrieren"},"auth-message":{"en":"You need to register or login.","de":"Sie müssen sich registrieren oder anmelden","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString"},"add-to-comparison":{"en":"Add to comparison","ru":"Добавить в сравнение","_type":"localeString"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"items-found":{"_type":"localeString","en":"Products found","ru":"Продуктов найдено"},"sort-sales-desc":{"ru":"По продаже","_type":"localeString","en":"By sale"},"sort-purchases-desc":{"_type":"localeString","en":"By purchase","ru":"По покупке"},"product-supplier":{"en":"Product supplier","ru":"Поставщик продукта","_type":"localeString"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product producer"},"products-fetching-error":{"ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString","en":"An error has occurred. Please reload the page."}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"en":"My profile","ru":"Мои данные","_type":"localeString"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"en":"Explore IT products by category","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"_type":"localeString","en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик."},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"_type":"localeString","en":"from","ru":"от"},"to":{"_type":"localeString","en":"to","ru":"до"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"en":"View","ru":"Вид","_type":"localeString"},"sort-type-label":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"category":{"en":"Category","ru":"Категория","_type":"localeString"},"follow":{"_type":"localeString","en":"Follow","ru":"Следить"},"add-product":{"en":"Add Product","ru":"Добавить продукт","_type":"localeString"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"filter-toggle":{"en":"Filter","ru":"Фильтр","_type":"localeString"},"clear-button":{"ru":"Очистить","_type":"localeString","en":"Сlear"},"delivery-type-field":{"en":"Delivery type","ru":"Тип поставки","_type":"localeString"},"product-categories-field":{"_type":"localeString","en":"product categories","ru":"категориz продуктаhjle"},"providers-field":{"ru":"Поставщик, производитель","_type":"localeString","en":"Providers"},"business-tasks-field":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"problems-field":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"with-discounts-checkbox":{"_type":"localeString","en":"With discounts","ru":"Со скидками"},"expert-price-checkbox":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"roi-calculator-checkbox":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"apply-filter-button":{"ru":"Применить фильтр","_type":"localeString","en":"Apply filter"},"sorting-toggle":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"en":"Suggest product","ru":"Предложить продукт","_type":"localeString"},"with-projects-label":{"_type":"localeString","en":"With deployments","ru":"С внедрениями"},"bonus-4-reference":{"en":"Bonus 4 Reference","ru":"Бонус за референс","_type":"localeString"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"_type":"localeString","en":"Countries","ru":"Страны"},"seller":{"_type":"localeString","en":"Seller","ru":"Продавец"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"_type":"localeString","en":"User suppliers","ru":"Поставщики пользователя"},"business-process":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"ru":"Пользователи","_type":"localeString","en":"Users"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"ru":"С референсами","_type":"localeString","en":"With reference"},"show-deal-checkbox":{"en":"Show deal with noname","ru":"Показывать сделки с noname","_type":"localeString"},"roi-checkbox":{"_type":"localeString","en":"ROI","ru":"ROI"},"problems":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"find":{"en":"Find","ru":"Выполнить поиск","_type":"localeString"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"ru":"Попробовать AI (Beta)","_type":"localeString","en":"Try AI (Beta)"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"en":"Company size","ru":"Размер компании","_type":"localeString"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"en":"Add deployment","ru":"Добавить внедрение","_type":"localeString"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"_type":"localeString","en":"From Z to A","ru":"От Я до А"},"sellers-field":{"_type":"localeString","en":"Sellers","ru":"Поставщики, Производители"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"_type":"localeString","en":"With comments","ru":"С комментариями"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"user":{"_type":"localeString","en":"User","ru":"Пользователь"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"ru":" Партнеры","_type":"localeString","en":"Partners"},"customers":{"en":"Customers","ru":"Покупатели","_type":"localeString"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"en":"Product vendor","ru":"Производитель продукта","_type":"localeString"},"implementation-date":{"en":"Deployment date","ru":"Дата внедрения","_type":"localeString"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"_type":"localeString","en":"Deal canceled","ru":"Сделка отменена"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"_type":"localeString","en":"Deal in progress","ru":"Сделка в процессе"},"deal-is-planned":{"en":"Deal is planned","ru":"Сделка планируется","_type":"localeString"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"_type":"localeString","en":"Proof of concept","ru":"Пилотный проект"},"stopped":{"en":"Stopped","ru":"Остановлено","_type":"localeString"},"competencies":{"_type":"localeString","en":"Competencies","ru":"Компетенции"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"body":{"_type":"localeBlock","en":[{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.","_key":"8bebcfb349550"}],"_type":"block","style":"normal","_key":"8bebcfb34955"}],"ru":[{"children":[{"_key":"28241882db7a0","_type":"span","marks":[],"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях."}],"_type":"block","style":"normal","_key":"28241882db7a","markDefs":[]}]},"label":"catalog-products-text-block"}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"meta":[{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"og:title","translations":{"en":"Products","ru":"Продукты","_type":"localeString"}},{"translations":{"en":"Description","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString"},"name":"description"},{"translations":{"en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString"},"name":"og:description"},{"translations":{"en":"keyword","ru":"каталог, программное обеспечение, софт, ит услуги","_type":"localeString"},"name":"keywords"},{"name":"title","translations":{"en":"Products","ru":"Продукты","_type":"localeString"}}],"title":{"ru":"ROI4CIO: Продукты","_type":"localeString","en":"ROI4CIO: Products"}}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"axis-f":{"id":206,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/AXIS_F.png","logo":true,"scheme":false,"title":"AXIS F","vendorVerified":0,"rating":"1.40","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":3,"alias":"axis-f","companyTitle":"Axis","companyTypes":["vendor"],"companyId":2751,"companyAlias":"axis","description":"AXIS F Series - Flexible cameras that let you see more\r\n\r\nFlexible, rugged, discreet design\r\n1-channel and 4-channel main units\r\nChoice of indoor, outdoor, standard, varifocal, pinhole, fisheye and dome sensor units\r\nWide Dynamic Range and Axis’ Zipstream technology\r\nTwo-way audio, input/output ports\r\nLocal storage, PoE, 8-28 V DC\r\nAXIS F Series\r\n\r\nDiscreet cameras for wide application\r\nAXIS F Series offers flexible, high-performance HDTV cameras for extremely discreet indoor, outdoor and in-vehicle surveillance applications. They are ideal for ATMs (automated teller machines), banks, stores, hotels, as well as rugged environments such as emergency vehicles, buses, trams and trucks.\r\n\r\nDivided concept\r\nAXIS F Series is based on a divided network camera concept, where the camera is split into a sensor unit—made up of a lens and image sensor with a cable—and a main unit, which is the body of a camera. The divided concept enables flexibility in the choice of hardware, as well as in the installation. The small sensor unit can be installed discreetly in tight places, while the long cable from the sensor unit to the main unit provides the flexibility to place the main unit where there is space. The main or sensor unit can be easily relocated or changed after the initial installation, giving users additional flexibility. \r\n\r\nWide selection\r\nAXIS F Series comprises one-channel AXIS F41 Main Unit, four-channel AXIS F34 and AXIS F44 Main Units, and AXIS F Sensor Units with different lens types, form factors and price points. The series also includes AXIS F34 Surveillance System, a complete hardware and software solution aimed at small stores and offices.\r\n\r\nWith the exception of AXIS F34 Surveillance System, AXIS F main units and sensor units are sold separately to give customers the ability to put together the hardware features that best suit the application.\r\nBuild your own camera system\r\nClick on the numbers at right to read more about the different components.\r\n\r\nMain unit\r\nThe main unit houses the processor, network, power and other connections. It determines, among other things, the video streaming performance, the image settings available (such as wide dynamic range), and analytics.\r\nOne-channel and four-channel main units are available. When there are up to four closely situated surveillance areas to be covered, the four-channel main units are cost-effective solutions as they can stream videos from four sensor units simultaneously.","shortDescription":"AXIS F Series offers flexible, high-performance HDTV cameras for extremely discreet indoor, outdoor and in-vehicle surveillance applications.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AXIS F","keywords":"AXIS, main, unit, sensor, units, Series, camera, concept","description":"AXIS F Series - Flexible cameras that let you see more\r\n\r\nFlexible, rugged, discreet design\r\n1-channel and 4-channel main units\r\nChoice of indoor, outdoor, standard, varifocal, pinhole, fisheye and dome sensor units\r\nWide Dynamic Range and Axis’ Zipstream tech","og:title":"AXIS F","og:description":"AXIS F Series - Flexible cameras that let you see more\r\n\r\nFlexible, rugged, discreet design\r\n1-channel and 4-channel main units\r\nChoice of indoor, outdoor, standard, varifocal, pinhole, fisheye and dome sensor units\r\nWide Dynamic Range and Axis’ Zipstream tech","og:image":"https://old.roi4cio.com/fileadmin/user_upload/AXIS_F.png"},"eventUrl":"","translationId":206,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":48,"title":"CCTV - Closed-circuit television","alias":"cctv-closed-circuit-television","description":"CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.\r\nCCTV relies on strategic placement of cameras, and observation of the camera's input on monitors somewhere. Because the cameras communicate with monitors and/or video recorders across private coaxial cable runs or wireless communication links, they gain the designation "closed-circuit" to indicate that access to their content is limited by design only to those able to see it.\r\nOlder CCTV systems used small, low-resolution black and white monitors with no interactive capabilities. Modern CCTV displays can be color, high-resolution displays and can include the ability to zoom in on an image or track something (or someone) among their features. Talk CCTV allows an overseer to speak to people within range of the camera's associated speakers.\r\nCCTV is commonly used for a variety of purposes, including:\r\n<ul><li>Maintaining perimeter security in medium- to high-secure areas and installations.</li><li>Observing the behavior of incarcerated inmates and potentially dangerous patients in medical facilities.</li><li>Traffic monitoring.</li><li>Overseeing locations that would be hazardous to a human, for example, highly radioactive or toxic industrial environments.</li><li>Building and grounds security.</li><li>Obtaining a visual record of activities in situations where it is necessary to maintain proper security or access controls (for example, in a diamond cutting or sorting operation; in banks, casinos, or airports).</li></ul>\r\nCCTV is finding increasing use in law-enforcement, for everything from traffic observation (and automated ticketing) to an observation of high-crime areas or neighborhoods. Such use of CCTV technology has fueled privacy concerns in many parts of the world, particularly in those areas in the UK and Europe where it has become a routine part of police procedure.","materialsDescription":" <span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \">Uses</span></span>\r\n<span style=\"font-weight: bold; \">Crime prevention</span>\r\nA 2009 systematic review by researchers from Northeastern University and University of Cambridge used meta-analytic techniques to pool the average effect of CCTV on crime across 41 different studies. The results indicated that\r\n<ul><li>CCTV caused a significant reduction of crime by on average 16%.</li><li>The largest effects of CCTV were found in car parks, where cameras reduced crime by on average 51%.</li><li>CCTV schemes in other public settings had small and non-statistically significant effects on crime: 7% reduction in city and town centers and 23% reduction in public transport settings.</li><li>When sorted by country, systems in the United Kingdom accounted for the majority of the decrease; the drop in other areas was insignificant.</li></ul>\r\nThe studies included in the meta-analysis used quasi-experimental evaluation designs that involve before-and-after measures of crime in experimental and control areas. However, several researchers have pointed to methodological problems associated with this research literature. First, researchers have argued that the British car park studies included in the meta-analysis cannot accurately control for the fact that CCTV was introduced simultaneously with a range of other security-related measures. Second, some have noted that, in many of the studies, there may be issues with selection bias since the introduction of CCTV was potentially endogenous to previous crime trends.[30] In particular, the estimated effects may be biased if CCTV is introduced in response to crime trends.\r\nIt has been argued that problems of selection bias and endogeneity can be addressed by stronger research designs such as randomized controlled trials and natural experiments. A 2017 review published in Journal of Scandinavian Studies in Criminology and Crime Prevention compiles seven studies that use such research designs. The studies included in the review found that CCTV reduced crime by 24-28% in public streets and urban subway stations. It also found that CCTV could decrease unruly behaviour in football stadiums and theft in supermarkets/mass merchant stores. However, there was no evidence of CCTV having desirable effects in parking facilities or suburban subway stations. Furthermore, the review indicates that CCTV is more effective in preventing property crimes than in violent crimes.\r\nAnother question in the effectiveness of CCTV for policing is around uptime of the system; in 2013 City of Philadelphia Auditor found that the $15M system was operational only 32% of the time. There is still much research to be done to determine the effectiveness of CCTV cameras on crime prevention before any conclusions can be drawn.\r\nThere is strong anecdotal evidence that CCTV aids in detection and conviction of offenders; indeed UK police forces routinely seek CCTV recordings after crimes. Moreover, CCTV has played a crucial role in tracing the movements of suspects or victims and is widely regarded by antiterrorist officers as a fundamental tool in tracking terrorist suspects. Large-scale CCTV installations have played a key part of the defences against terrorism since the 1970s. Cameras have also been installed on public transport in the hope of deterring crime, and in mobile police surveillance vehicles, often with automatic number plate recognition, and a network of APNI-linked cameras is used to manage London's congestion charging zone.\r\nA more open question is whether most CCTV is cost-effective. While low-quality domestic kits are cheap the professional installation and maintenance of high definition CCTV is expensive. Gill and Spriggs did a Cost-effectiveness analysis (CEA) of CCTV in crime prevention that showed little monetary saving with the installation of CCTV as most of the crimes prevented resulted in little monetary loss. Critics however noted that benefits of non-monetary value cannot be captured in a traditional Cost Effectiveness Analysis and were omitted from their study. A 2008 Report by UK Police Chiefs concluded that only 3% of crimes were solved by CCTV. In London, a Metropolitan Police report showed that in 2008 only one crime was solved per 1000 cameras. In some cases CCTV cameras have become a target of attacks themselves.\r\nCities such as Manchester in the UK are using DVR-based technology to improve accessibility for crime prevention.\r\nIn October 2009, an "Internet Eyes" website was announced which would pay members of the public to view CCTV camera images from their homes and report any crimes they witnessed. The site aimed to add "more eyes" to cameras which might be insufficiently monitored. Civil liberties campaigners criticized the idea as "a distasteful and a worrying development".\r\nIn 2013 Oaxaca hired deaf police officers to lip read conversations to uncover criminal conspiracies.\r\nIn Singapore, since 2012, thousands of CCTV cameras have helped deter loan sharks, nab litterbugs and stop illegal parking, according to government figures.\r\n<span style=\"font-weight: bold; \">Body worn</span>\r\nIn recent years, the use of body worn video cameras has been introduced for a number of uses. For example, as a new form of surveillance in law enforcement, with cameras located on a police officer's chest or head.\r\n<span style=\"font-weight: bold; \">Industrial processes</span>\r\nIndustrial processes that take place under conditions dangerous for humans are today often supervised by CCTV. These are mainly processes in the chemical industry, the interior of reactors or facilities for manufacture of nuclear fuel. Special cameras for some of these purposes include line-scan cameras and thermographic cameras which allow operators to measure the temperature of the processes. The usage of CCTV in such processes is sometimes required by law.\r\n<span style=\"font-weight: bold; \">Traffic monitoring</span>\r\nMany cities and motorway networks have extensive traffic-monitoring systems, using closed-circuit television to detect congestion and notice accidents. Many of these cameras however, are owned by private companies and transmit data to drivers' GPS systems.\r\nThe UK Highways Agency has a publicly owned CCTV network of over 3000 Pan-Tilt-Zoom cameras covering the British motorway and trunk road network. These cameras are primarily used to monitor traffic conditions and are not used as speed cameras. With the addition of fixed cameras for the active traffic management system, the number of cameras on the Highways Agency's CCTV network is likely to increase significantly over the next few years.\r\nThe London congestion charge is enforced by cameras positioned at the boundaries of and inside the congestion charge zone, which automatically read the licence plates of cars. If the driver does not pay the charge then a fine will be imposed. Similar systems are being developed as a means of locating cars reported stolen.\r\nOther surveillance cameras serve as traffic enforcement cameras.\r\n<span style=\"font-weight: bold; \">Transport safety</span>\r\nA CCTV system may be installed where any example, on a Driver-only operated train CCTV cameras may allow the driver to confirm that people are clear of doors before closing them and starting the train.\r\n<span style=\"font-weight: bold; \">Sporting events</span>\r\nMany sporting events in the United States use CCTV inside the venue for fans to see the action while they are away from their seats. The cameras send the feed to a central control center where a producer selects feeds to send to the television monitors that fans can view. CCTV monitors for viewing the event by attendees are often placed in lounges, hallways, and restrooms. This use of CCTV is not used for surveillance purposes.\r\n<span style=\"font-weight: bold; \">Monitor employees</span>\r\nOrganizations use CCTV to monitor the actions of workers. Every action is recorded as an information block with subtitles that explain the performed operation. This helps to track the actions of workers, especially when they are making critical financial transactions, such as correcting or cancelling of a sale, withdrawing money or altering personal information.\r\nActions which an employer may wish to monitor could include:\r\n<ul><li>Scanning of goods, selection of goods, introduction of price and quantity;</li><li>Input and output of operators in the system when entering passwords;</li><li>Deleting operations and modifying existing documents;</li><li>Implementation of certain operations, such as financial statements or operations with cash;</li><li>Moving goods, revaluation scrapping and counting;</li><li>Control in the kitchen of fast food restaurants;</li><li>Change of settings, reports and other official functions.</li></ul>\r\nEach of these operations is transmitted with a description, allowing detailed monitoring of all actions of the operator. Some systems allow the user to search for a specific event by time of occurrence and text description, and perform statistical evaluation of operator behaviour. This allows the software to predict deviations from the standard workflow and record only anomalous behaviour.\r\n<span style=\"font-weight: bold; \">Use in schools</span>\r\nIn the United States, Britain, Australia and New Zealand, CCTV is widely used in schools due to its success in preventing bullying, vandalism, monitoring visitors and maintaining a record of evidence in the event of a crime. There are some restrictions on installation, with cameras not being installed in an area where there is a "reasonable expectation of privacy", such as bathrooms, gym locker areas and private offices (unless consent by the office occupant is given). Сameras are generally acceptable in hallways, parking lots, front offices where students, employees, and parents come and go, gymnasiums, cafeterias, supply rooms and classrooms. The installation of cameras in classrooms may be objected to by some teachers.\r\n<span style=\"font-weight: bold; \">Criminal use</span>\r\nCriminals may use surveillance cameras to monitor the public. For example, a hidden camera at an ATM can capture people's PINs as they are entered, without their knowledge. The devices are small enough not to be noticed, and are placed where they can monitor the keypad of the machine as people enter their PINs. Images may be transmitted wirelessly to the criminal. Even lawful surveillance cameras sometimes have their data go into the hands of people who have no legal right to receive it.\r\n\r\n<span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \">Technological developments</span></span>\r\n<span style=\"font-weight: bold; \">Computer-controlled analytics and identification</span>\r\nComputer-controlled cameras can identify, track, and categorize objects in their field of view.\r\n<span style=\"font-weight: bold; \">Video content analysis (VCA)</span> is the capability of automatically analyzing video to detect and determine temporal events not based on a single image, but rather object classification. As such, it can be seen as the automated equivalent of the biological visual cortex.\r\nA system using VCA can recognize changes in the environment and even identify and compare objects in the database using size, speed, and sometimes colour. The camera's actions can be programmed based on what it is "seeing". For example; an alarm can be issued if an object has moved in a certain area, or if a painting is missing from a wall, or if a smoke or fire is detected, or if running people are detected, or if fallen people are detected and if someone has spray painted the lens, as well as video loss, lens cover, defocus and other so called camera tampering events.\r\nVCA analytics can also be used to detect unusual patterns in an environment. The system can be set to detect anomalies in a crowd, for instance a person moving in the opposite direction in airports where passengers are supposed to walk only in one direction out of a plane or in a subway where people are not supposed to exit through the entrances.\r\nVCA can track people on a map by calculating their position from the images. It is then possible to link many cameras and track a person through an entire building or area. This can allow a person to be followed without having to analyze many hours of film. Currently the cameras have difficulty identifying individuals from video alone, but if connected to a key-card system, identities can be established and displayed as a tag over their heads on the video.\r\nThere is also a significant difference in where the VCA technology is placed, either the data is being processed within the cameras (on the edge) or by a centralized server. Both technologies have their pros and cons.\r\nA <span style=\"font-weight: bold; \">facial recognition system</span> is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database.\r\nThe combination of CCTV and facial recognition has been tried as a form of mass surveillance, but has been ineffective because of the low discriminating power of facial recognition technology and the very high number of false positives generated. This type of system has been proposed to compare faces at airports and seaports with those of suspected terrorists or other undesirable entrants.[citation needed] Computerized monitoring of CCTV images is under development, so that a human CCTV operator does not have to endlessly look at all the screens, allowing an operator to observe many more CCTV cameras.[citation needed] These systems do not observe people directly. Insta Types of body-movement behavior, or particular types of clothing or baggage.\r\nTo many, the development of CCTV in public areas, linked to computer databases of people's pictures and identity, presents a serious breach of civil liberties. Conservative critics fear the possibility that one would no longer have anonymity in public places. Demonstrations or assemblies in public places could be affected as the state would be able to collate lists of those leading them, taking part, or even just talking with protesters in the street.\r\nComparatively harmless are people counter systems. They use CCTV equipment as front end eyes of devices which perform shape recognition technology in order to identify objects as human beings and count people passing pre-defined areas.\r\n<span style=\"font-weight: bold; \">Retention, storage and preservation</span>\r\nMost CCTV systems may record and store digital video and images to a digital video recorder (DVR) or, in the case of IP cameras, directly to a server, either on-site or offsite.\r\nThere is a cost in the retention of the images produced by CCTV systems. The amount and quality of data stored on storage media is subject to compression ratios, images stored per second, image size and is effected by the retention period of the videos or images. DVRs store images in a variety of proprietary file formats. Recordings may be retained for a preset amount of time and then automatically archived, overwritten or deleted, the period being determined by the organisation that generated them.\r\nClosed-circuit digital photography (CCDP)\r\nClosed-circuit digital photography (CCDP) is more suited for capturing and saving recorded high-resolution photographs, whereas closed-circuit television (CCTV) is more suitable for live-monitoring purposes.\r\nHowever, an important feature of some CCTV systems is the ability to take high resolution images of the camera scene, e.g. on a time lapse or motion-detection basis. Images taken with a digital still camera often have higher resolution than those taken with some video cameras. Increasingly, low-cost high-resolution digital still cameras can also be used for CCTV purposes.\r\nImages may be monitored remotely when the computer is connected to a network.\r\n<span style=\"font-weight: bold; \">IP cameras</span>\r\nA growing branch in CCTV is internet protocol cameras (IP cameras). It is estimated that 2014 was the first year that IP cameras outsold analog cameras. IP cameras use the Internet Protocol (IP) used by most Local Area Networks (LANs) to transmit video across data networks in digital form. IP can optionally be transmitted across the public internet, allowing users to view their cameras through any internet connection available through a computer or a phone, this is considered remote access. For professional or public infrastructure security applications, IP video is restricted to within a private network or VPN, or can be recorded onto a remote server.\r\n<span style=\"font-weight: bold; \">Networking CCTV cameras</span>\r\nThe city of Chicago operates a networked video surveillance system which combines CCTV video feeds of government agencies with those of the private sector, installed in city buses, businesses, public schools, subway stations, housing projects etc. Even homeowners are able to contribute footage. It is estimated to incorporate the video feeds of a total of 15,000 cameras.\r\nThe system is used by Chicago's Office of Emergency Management in case of an emergency call: it detects the caller's location and instantly displays the real-time video feed of the nearest security camera to the operator, not requiring any user intervention. While the system is far too vast to allow complete real-time monitoring, it stores the video data for later usage in order to provide possible evidence in criminal cases.\r\nNew York City has a similar network called the Domain Awareness System.\r\nLondon also has a network of CCTV systems that allows multiple authorities to view and control CCTV cameras in real time. The system allows authorities including the Metropolitan Police Service, Transport for London and a number of London boroughs to share CCTV images between them. It uses a network protocol called Television Network Protocol to allow access to many more cameras than each individual system owner could afford to run and maintain.\r\nThe Glynn County Police Department uses a wireless mesh-networked system of portable battery-powered tripods for live megapixel video surveillance and central monitoring of tactical police situations. The systems can be used either on a stand-alone basis with secure communications to nearby police laptops, or within a larger mesh system with multiple tripods feeding video back to the command vehicle via wireless, and to police headquarters via 3G.\r\n<span style=\"font-weight: bold; \">Integrated systems</span>\r\nIntegrated systems allow different security systems, like CCTV, access control, intruder alarms and intercoms to operate together. For example, when an intruder alarm is activated, CCTV cameras covering the intrusion area are recorded at a higher frame rate and transmitted to an Alarm Receiving Centre.\r\n<span style=\"font-weight: bold; \">Wireless security cameras</span>\r\nMany consumers are turning to wireless security cameras for home surveillance. Wireless cameras do not require a video cable for video/audio transmission, simply a cable for power. Wireless cameras are also easy and inexpensive to install, but lack the reliability of hard-wired cameras. Previous generations of wireless security cameras relied on analog technology; modern wireless cameras use digital technology which delivers crisper audio, sharper video, and a secure and interference-free signal.\r\n<span style=\"font-weight: bold;\">Talking CCTV</span>\r\nIn Wiltshire, UK, 2003, a pilot scheme for what is now known as "Talking CCTV" was put into action; allowing operators of CCTV cameras to order offenders to stop what they were doing, ranging from ordering subjects to pick up their rubbish and put it in a bin to ordering groups of vandals to disperse. In 2005, Ray Mallon, the mayor and former senior police officer of Middlesbrough implemented "Talking CCTV" in his area.\r\nOther towns have had such cameras installed. In 2007 several of the devices were installed in Bridlington town centre, East Riding of Yorkshire.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CCTV.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-poweredge-mx7000-modular-chassis":{"id":4770,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Dell_PowerEdge_MX7000_Modular_Chassis.jpg","logo":true,"scheme":false,"title":"Dell PowerEdge MX7000 Modular Chassis","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-poweredge-mx7000-modular-chassis","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"<span style=\"font-weight: bold; \">Liberate IT resources to achieve optimal utilization, productivity and efficiency</span>\r\nAs dynamic and innovative as your business, PowerEdge MX kinetic infrastructure bridges traditional and software-defined data centers with unequal flexibility and agility. At the foundation, PowerEdge MX7000 chassis hosts disaggregated blocks of server and storage to create consumable resources on-demand. Shared power, cooling, networking, I/O and in-chassis management provides outstanding efficiencies.\r\n<ul><li>7U modular enclosure with eight slots holds 2S single or four 4S double-width compute sleds and 12Gbs single-width storage sleds</li><li>25Gb Ethernet, 12Gb SAS and 32Gb Fibre Channel I/O options</li><li>Three I/O networking fabrics, two general purpose and one storage specific, each with redundant modules</li><li>Multi-chassis networking up to 10 chassis</li><li>Single management point for compute, storage and networking</li><li>High-speed technology connections, now and into the future, with no midplane upgrade</li><li>At least three server processor microarchitecture generation support assurance</li></ul>\r\n<span style=\"font-weight: bold; \">Dynamically scale and respond with kinetic infrastructure</span>\r\nDesigned with Dell EMC’s kinetic infrastructure, PowerEdge MX creates shared pools of disaggregated compute and storage resources, connected by scalable fabric, from which workloads can draw resources needed to run most quickly and efficiently. Then when no longer needed the resources are returned into the pool. By essentially creating hardware on the fly the capacity can be managed at a data center level instead of a per server level.\r\n<ul><li>Full-featured, no compromise compute sleds with Intel® Xeon® Scalable processors</li><li>Generous, scalable on-board SAS, SATA, and NVMe storage drives, plus substantial, granular SAS direct-attached storage using optional storage sleds</li><li>Scalable fabric architecture with a grow-as-you-need fabric expansion capability for up to 10 chassis in fabric.</li></ul>\r\n<span style=\"font-weight: bold; \">Increase effectiveness and accelerate operations with unified automation</span>\r\nEmbedded Dell EMC OpenManage Enterprise – Modular Edition delivers the key abilities of OpenMange Enterprise systems management within the PowerEdge MX chassis. A unified simple interface manages compute, storage and fabric, reducing costs and the learning curve and consolidates multiple tools. Redundant management modules ensure highest availability.\r\n<ul><li>Automatic expansion from one to multiple chassis; scale management to thousands of PowerEdge MX and rack servers with OpenManage Enterprise</li><li>Flexible, at-the-box management front control panel options include Quick Sync 2 (wireless), touchscreen LCD and traditional crash cart</li><li>Comprehensive RESTful API helps automate multiple tasks and integrates to third-party tools</li><li>Seamlessly integrates with integrated Dell Remote Access Controller 9 (iDRAC9) and Lifecycle Controller (LC)</li></ul>\r\n<span style=\"font-weight: bold;\">Protect infrastructure and investment with responsive design</span>\r\nReduce the risk of infrastructure investment and help make new innovations more easily available with PowerEdge MX7000 future-forward architecture. Designed to maximize longevity and minimize disruptive technology changes support across both generational and architectural transitions is provided.\r\n<ul><li>Multi-generational assurance with support for at least three server processor microarchitecture generations</li><li>Nearly zero throughput limitations, providing high-speed technology connections, and well into the future, with no midplane upgrade</li><li>Industry-leading thermal architecture and mechanical design and control algorithms support dense configurations and future compatibility</li></ul>","shortDescription":"Dynamically assign, move and scale shared pools of compute, storage and fabric, with greater flexibility and efficiency, and deliver optimal value.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dell PowerEdge MX7000 Modular Chassis","keywords":"","description":"<span style=\"font-weight: bold; \">Liberate IT resources to achieve optimal utilization, productivity and efficiency</span>\r\nAs dynamic and innovative as your business, PowerEdge MX kinetic infrastructure bridges traditional and software-defined data centers wi","og:title":"Dell PowerEdge MX7000 Modular Chassis","og:description":"<span style=\"font-weight: bold; \">Liberate IT resources to achieve optimal utilization, productivity and efficiency</span>\r\nAs dynamic and innovative as your business, PowerEdge MX kinetic infrastructure bridges traditional and software-defined data centers wi","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Dell_PowerEdge_MX7000_Modular_Chassis.jpg"},"eventUrl":"","translationId":4771,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":4,"title":"Data center","alias":"data-center","description":" A data center (or datacenter) is a facility composed of networked computers and storage that businesses or other organizations use to organize, process, store and disseminate large amounts of data. A business typically relies heavily upon the applications, services and data contained within a data center, making it a focal point and critical asset for everyday operations.\r\nData centers are not a single thing, but rather, a conglomeration of elements. At a minimum, data centers serve as the principal repositories for all manner of IT equipment, including servers, storage subsystems, networking switches, routers and firewalls, as well as the cabling and physical racks used to organize and interconnect the IT equipment. A data center must also contain an adequate infrastructure, such as power distribution and supplemental power subsystems, including electrical switching; uninterruptable power supplies; backup generators and so on; ventilation and data center cooling systems, such as computer room air conditioners; and adequate provisioning for network carrier (telco) connectivity. All of this demands a physical facility with physical security and sufficient physical space to house the entire collection of infrastructure and equipment.","materialsDescription":" <span style=\"font-weight: bold;\">What are the requirements for modern data centers?</span>\r\nModernization and data center transformation enhances performance and energy efficiency.\r\nInformation security is also a concern, and for this reason a data center has to offer a secure environment which minimizes the chances of a security breach. A data center must therefore keep high standards for assuring the integrity and functionality of its hosted computer environment.\r\nIndustry research company International Data Corporation (IDC) puts the average age of a data center at nine years old. Gartner, another research company, says data centers older than seven years are obsolete. The growth in data (163 zettabytes by 2025) is one factor driving the need for data centers to modernize.\r\nFocus on modernization is not new: Concern about obsolete equipment was decried in 2007, and in 2011 Uptime Institute was concerned about the age of the equipment therein. By 2018 concern had shifted once again, this time to the age of the staff: "data center staff are aging faster than the equipment."\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Meeting standards for data centers</span></span>\r\nThe Telecommunications Industry Association's Telecommunications Infrastructure Standard for Data Centers specifies the minimum requirements for telecommunications infrastructure of data centers and computer rooms including single tenant enterprise data centers and multi-tenant Internet hosting data centers. The topology proposed in this document is intended to be applicable to any size data center.\r\nTelcordia GR-3160, NEBS Requirements for Telecommunications Data Center Equipment and Spaces, provides guidelines for data center spaces within telecommunications networks, and environmental requirements for the equipment intended for installation in those spaces. These criteria were developed jointly by Telcordia and industry representatives. They may be applied to data center spaces housing data processing or Information Technology (IT) equipment. The equipment may be used to:\r\n<ul><li>Operate and manage a carrier's telecommunication network</li><li>Provide data center based applications directly to the carrier's customers</li><li>Provide hosted applications for a third party to provide services to their customers</li><li>Provide a combination of these and similar data center applications</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Data center transformation</span></span>\r\nData center transformation takes a step-by-step approach through integrated projects carried out over time. This differs from a traditional method of data center upgrades that takes a serial and siloed approach. The typical projects within a data center transformation initiative include standardization/consolidation, virtualization, automation and security.\r\n<ul><li>Standardization/consolidation: Reducing the number of data centers and avoiding server sprawl (both physical and virtual) often includes replacing aging data center equipment, and is aided by standardization.</li><li>Virtualization: Lowers capital and operational expenses, reduce energy consumption. Virtualized desktops can be hosted in data centers and rented out on a subscription basis. Investment bank Lazard Capital Markets estimated in 2008 that 48 percent of enterprise operations will be virtualized by 2012. Gartner views virtualization as a catalyst for modernization.</li><li>Automating: Automating tasks such as provisioning, configuration, patching, release management and compliance is needed, not just when facing fewer skilled IT workers.</li><li>Securing: Protection of virtual systems is integrated with existing security of physical infrastructures.</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Machine room</span></span>\r\nThe term "Machine Room" is at times used to refer to the large room within a Data Center where the actual Central Processing Unit is located; this may be separate from where high-speed printers are located. Air conditioning is most important in the machine room.\r\nAside from air-conditioning, there must be monitoring equipment, one type of which is to detect water prior to flood-level situations. One company, for several decades, has had share-of-mind: Water Alert. The company, as of 2018, has 2 competing manufacturers (Invetex, Hydro-Temp) and 3 competing distributors (Longden,Northeast Flooring, Slayton). ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Data_center.png"},{"id":471,"title":"Hardware","alias":"hardware","description":" Computer hardware includes the physical, tangible parts or components of a computer, such as the cabinet, central processing unit, monitor, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is instructions that can be stored and run by hardware. Hardware is so-termed because it is "hard" or rigid with respect to changes or modifications; whereas software is "soft" because it is easy to update or change. Intermediate between software and hardware is "firmware", which is software that is strongly coupled to the particular hardware of a computer system and thus the most difficult to change but also among the most stable with respect to consistency of interface. The progression from levels of "hardness" to "softness" in computer systems parallels a progression of layers of abstraction in computing.\r\nHardware is typically directed by the software to execute any command or instruction. A combination of hardware and software forms a usable computing system, although other systems exist with only hardware components.\r\nThe template for all modern computers is the Von Neumann architecture, detailed in a 1945 paper by Hungarian mathematician John von Neumann. This describes a design architecture for an electronic digital computer with subdivisions of a processing unit consisting of an arithmetic logic unit and processor registers, a control unit containing an instruction register and program counter, a memory to store both data and instructions, external mass storage, and input and output mechanisms. The meaning of the term has evolved to mean a stored-program computer in which an instruction fetch and a data operation cannot occur at the same time because they share a common bus. This is referred to as the Von Neumann bottleneck and often limits the performance of the system.","materialsDescription":" <span style=\"font-weight: bold; \">What does Hardware (H/W) mean?</span>\r\nHardware (H/W), in the context of technology, refers to the physical elements that make up a computer or electronic system and everything else involved that is physically tangible. This includes the monitor, hard drive, memory and CPU. Hardware works hand-in-hand with firmware and software to make a computer function.\r\n<span style=\"font-weight: bold; \">What are the types of computer systems?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Personal computer</span></span>\r\nThe personal computer, also known as the PC, is one of the most common types of computer due to its versatility and relatively low price. Laptops are generally very similar, although they may use lower-power or reduced size components, thus lower performance.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Case</span></span>\r\nThe computer case encloses and holds most of the components of the system. It provides mechanical support and protection for internal elements such as the motherboard, disk drives, and power supplies, and controls and directs the flow of cooling air over internal components. The case is also part of the system to control electromagnetic interference radiated by the computer, and protects internal parts from electrostatic discharge. Large tower cases provide extra internal space for multiple disk drives or other peripherals and usually stand on the floor, while desktop cases provide less expansion room. All-in-one style designs include a video display built into the same case. Portable and laptop computers require cases that provide impact protection for the unit. A current development in laptop computers is a detachable keyboard, which allows the system to be configured as a touch-screen tablet. Hobbyists may decorate the cases with colored lights, paint, or other features, in an activity called case modding.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Power supply</span></span>\r\nA power supply unit (PSU) converts alternating current (AC) electric power to low-voltage direct current (DC) power for the internal components of the computer. Laptops are capable of running from a built-in battery, normally for a period of hours. The PSU typically uses a switched-mode power supply (SMPS), with power MOSFETs (power metal–oxide–semiconductor field-effect transistors) used in the converters and regulator circuits of the SMPS.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Motherboard</span></span>\r\nThe motherboard is the main component of a computer. It is a board with integrated circuitry that connects the other parts of the computer including the CPU, the RAM, the disk drives (CD, DVD, hard disk, or any others) as well as any peripherals connected via the ports or the expansion slots. The integrated circuit (IC) chips in a computer typically contain billions of tiny metal–oxide–semiconductor field-effect transistors (MOSFETs).\r\nComponents directly attached to or to part of the motherboard include:\r\n<ul><li><span style=\"font-weight: bold; \">The CPU (central processing unit)</span>, which performs most of the calculations which enable a computer to function, and is referred to as the brain of the computer which get a hold of program instruction from random-access memory (RAM), interprets and processes it and then send it backs to computer result so that the relevant components can carry out the instructions. The CPU is a microprocessor, which is fabricated on a metal–oxide–semiconductor (MOS) integrated circuit (IC) chip. It is usually cooled by a heat sink and fan, or water-cooling system. Most newer CPU include an on-die graphics processing unit (GPU). The clock speed of CPU governs how fast it executes instructions, and is measured in GHz; typical values lie between 1 GHz and 5 GHz. Many modern computers have the option to overclock the CPU which enhances performance at the expense of greater thermal output and thus a need for improved cooling.</li><li><span style=\"font-weight: bold; \">The chipset</span>, which includes the north bridge, mediates communication between the CPU and the other components of the system, including main memory; as well as south bridge, which is connected to the north bridge, and supports auxiliary interfaces and buses; and, finally, a Super I/O chip, connected through the south bridge, which supports the slowest and most legacy components like serial ports, hardware monitoring and fan control.</li><li><span style=\"font-weight: bold; \">Random-access memory (RAM)</span>, which stores the code and data that are being actively accessed by the CPU. For example, when a web browser is opened on the computer it takes up memory; this is stored in the RAM until the web browser is closed. It is typically a type of dynamic RAM (DRAM), such as synchronous DRAM (SDRAM), where MOS memory chips store data on memory cells consisting of MOSFETs and MOS capacitors. RAM usually comes on dual in-line memory modules (DIMMs) in the sizes of 2GB, 4GB, and 8GB, but can be much larger.</li><li><span style=\"font-weight: bold; \">Read-only memory (ROM)</span>, which stores the BIOS that runs when the computer is powered on or otherwise begins execution, a process known as Bootstrapping, or "booting" or "booting up". The ROM is typically a nonvolatile BIOS memory chip, which stores data on floating-gate MOSFET memory cells.</li><li><span style=\"font-weight: bold; \">The BIOS (Basic Input Output System)</span> includes boot firmware and power management firmware. Newer motherboards use Unified Extensible Firmware Interface (UEFI) instead of BIOS.</li><li><span style=\"font-weight: bold; \">Buses</span> that connect the CPU to various internal components and to expand cards for graphics and sound.</li><li><span style=\"font-weight: bold; \">The CMOS</span> (complementary MOS) battery, which powers the CMOS memory for date and time in the BIOS chip. This battery is generally a watch battery.</li><li><span style=\"font-weight: bold; \">The video card</span> (also known as the graphics card), which processes computer graphics. More powerful graphics cards are better suited to handle strenuous tasks, such as playing intensive video games or running computer graphics software. A video card contains a graphics processing unit (GPU) and video memory (typically a type of SDRAM), both fabricated on MOS integrated circuit (MOS IC) chips.</li><li><span style=\"font-weight: bold; \">Power MOSFETs</span> make up the voltage regulator module (VRM), which controls how much voltage other hardware components receive.</li></ul>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Expansion cards</span></span>\r\nAn expansion card in computing is a printed circuit board that can be inserted into an expansion slot of a computer motherboard or backplane to add functionality to a computer system via the expansion bus. Expansion cards can be used to obtain or expand on features not offered by the motherboard.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Storage devices</span></span>\r\nA storage device is any computing hardware and digital media that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device. Data storage is a core function and fundamental component of computers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Fixed media</span></span>\r\nData is stored by a computer using a variety of media. Hard disk drives (HDDs) are found in virtually all older computers, due to their high capacity and low cost, but solid-state drives (SSDs) are faster and more power efficient, although currently more expensive than hard drives in terms of dollar per gigabyte, so are often found in personal computers built post-2007. SSDs use flash memory, which stores data on MOS memory chips consisting of floating-gate MOSFET memory cells. Some systems may use a disk array controller for greater performance or reliability.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Removable media</span></span>\r\nTo transfer data between computers, an external flash memory device (such as a memory card or USB flash drive) or optical disc (such as a CD-ROM, DVD-ROM or BD-ROM) may be used. Their usefulness depends on being readable by other systems; the majority of machines have an optical disk drive (ODD), and virtually all have at least one Universal Serial Bus (USB) port.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Input and output peripherals</span></span>\r\nInput and output devices are typically housed externally to the main computer chassis. The following are either standard or very common to many computer systems.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Input</span></span>\r\nInput devices allow the user to enter information into the system, or control its operation. Most personal computers have a mouse and keyboard, but laptop systems typically use a touchpad instead of a mouse. Other input devices include webcams, microphones, joysticks, and image scanners.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Output device</span></span>\r\nOutput devices display information in a human readable form. Such devices could include printers, speakers, monitors or a Braille embosser.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Mainframe computer</span></span>\r\nA mainframe computer is a much larger computer that typically fills a room and may cost many hundreds or thousands of times as much as a personal computer. They are designed to perform large numbers of calculations for governments and large enterprises.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Departmental computing</span></span>\r\nIn the 1960s and 1970s, more and more departments started to use cheaper and dedicated systems for specific purposes like process control and laboratory automation.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Supercomputer</span></span>\r\nA supercomputer is superficially similar to a mainframe, but is instead intended for extremely demanding computational tasks. As of June 2018, the fastest supercomputer on the TOP500supercomputer list is the Summit, in the United States, with a LINPACK benchmarkscore of 122.3 PFLOPS Light, by around 29 PFLOPS.\r\nThe term supercomputer does not refer to a specific technology. Rather it indicates the fastest computations available at any given time. In mid 2011, the fastest supercomputers boasted speeds exceeding one petaflop, or 1 quadrillion (10^15 or 1,000 trillion) floating point operations per second. Supercomputers are fast but extremely costly, so they are generally used by large organizations to execute computationally demanding tasks involving large data sets. Supercomputers typically run military and scientific applications. Although costly, they are also being used for commercial applications where huge amounts of data must be analyzed. For example, large banks employ supercomputers to calculate the risks and returns of various investment strategies, and healthcare organizations use them to analyze giant databases of patient data to determine optimal treatments for various diseases and problems incurring to the country. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Hardware.jpg"},{"id":513,"title":"Networking","alias":"networking","description":" Networking hardware, also known as network equipment or computer networking devices, are electronic devices which are required for communication and interaction between devices on a computer network. Specifically, they mediate data transmission in a computer network. Units which are the last receiver or generate data are called hosts or data terminal equipment.\r\nNetworking devices may include gateways, routers, network bridges, modems, wireless access points, networking cables, line drivers, switches, hubs, and repeaters; and may also include hybrid network devices such as multilayer switches, protocol converters, bridge routers, proxy servers, firewalls, network address translators, multiplexers, network interface controllers, wireless network interface controllers, ISDN terminal adapters and other related hardware.\r\nThe most common kind of networking hardware today is a copper-based Ethernet adapter which is a standard inclusion on most modern computer systems. Wireless networking has become increasingly popular, especially for portable and handheld devices.\r\nOther networking hardware used in computers includes data center equipment (such as file servers, database servers and storage areas), network services (such as DNS, DHCP, email, etc.) as well as devices which assure content delivery.\r\nTaking a wider view, mobile phones, tablet computers and devices associated with the internet of things may also be considered networking hardware. As technology advances and IP-based networks are integrated into building infrastructure and household utilities, network hardware will become an ambiguous term owing to the vastly increasing number of network capable endpoints.","materialsDescription":" <span style=\"font-weight: bold;\">What is network equipment?</span>\r\nNetwork equipment - devices necessary for the operation of a computer network, for example: a router, switch, hub, patch panel, etc. You can distinguish between active and passive network equipment.\r\n<span style=\"font-weight: bold;\">What is an active network equipment?</span>\r\nActive networking equipment is equipment followed by some “smart” feature. That is, a router, switch (switch), etc. are active network equipment.\r\n<span style=\"font-weight: bold;\">What is passive network equipment?</span>\r\nPassive network equipment - equipment not endowed with "intellectual" features. For example - cable system: cable (coaxial and twisted pair (UTP/STP)), plug / socket (RG58, RJ45, RJ11, GG45), repeater (repeater), patch panel, hub (hub), balun (balun) for coaxial cables (RG-58), etc. Also, passive equipment can include mounting cabinets and racks, telecommunication cabinets.\r\n<span style=\"font-weight: bold;\">What are the main network components?</span>\r\nThe main components of the network are workstations, servers, transmission media (cables) and network equipment.\r\n<span style=\"font-weight: bold;\">What are workstations?</span>\r\nWorkstations are network computers where network users implement application tasks.\r\n<span style=\"font-weight: bold;\">What are network servers?</span>\r\nNetwork servers - hardware and software systems that perform the functions of controlling the distribution of network shared resources. A server can be any computer connected to the network on which the resources used by other devices on the local network are located. As the server hardware, fairly powerful computers are used.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Networking.png"},{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-precision-workstations":{"id":67,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Rabochie_stancii_Dell_Precision.jpg","logo":true,"scheme":false,"title":"Dell Precision Workstations","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-precision-workstations","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Dell Precision Workstations were computers intended as workstations for CAD / Architecture / CG professionals, or as small-scale business servers.\r\n<h2 style=\"margin: 0px 0px 10px; padding: 0px 0px 10px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-size: 1.153em; font-weight: 300; line-height: 1.3em; text-rendering: optimizeLegibility; font-family: Museo, "Trebuchet MS", Arial !important; \">Precision Mobile Workstations - For professional creators</h2>\r\n<p style=\"margin: 0px 0px 30px; padding: 0px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-family: "Trebuchet MS", Arial, Helvetica, sans-serif; font-size: 13px; line-height: 1.3em; color: rgb(68, 68, 68); \">Highest performing and fully customizable workstations certified with professional applications.</p>\r\n<h2 style=\"margin: 0px 0px 10px; padding: 0px 0px 10px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-size: 1.153em; font-weight: 300; line-height: 1.3em; text-rendering: optimizeLegibility; font-family: Museo, "Trebuchet MS", Arial !important; \">Precision Fixed Workstations - For professional creators</h2>\r\n<p style=\"margin: 0px 0px 30px; padding: 0px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-family: "Trebuchet MS", Arial, Helvetica, sans-serif; font-size: 13px; line-height: 1.3em; color: rgb(68, 68, 68); \">Highest performing and fully customizable workstations certified with professional applications.</p>\r\n<p style=\"margin: 0px 0px 30px; padding: 0px; border: 0px; vertical-align: baseline; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial; font-family: "Trebuchet MS", Arial, Helvetica, sans-serif; font-size: 13px; line-height: 1.3em; color: rgb(68, 68, 68); \"></p>","shortDescription":"Dell Precision Workstations were computers intended as workstations for CAD / Architecture / CG professionals, or as small-scale business servers.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dell Precision Workstations","keywords":"professional, Workstations, Precision, workstations, performing, Highest, -For, creators","description":"Dell Precision Workstations were computers intended as workstations for CAD / Architecture / CG professionals, or as small-scale business servers.\r\n<h2 style=\"margin: 0px 0px 10px; padding: 0px 0px 10px; border: 0px; vertical-align: baseline; background-image:","og:title":"Dell Precision Workstations","og:description":"Dell Precision Workstations were computers intended as workstations for CAD / Architecture / CG professionals, or as small-scale business servers.\r\n<h2 style=\"margin: 0px 0px 10px; padding: 0px 0px 10px; border: 0px; vertical-align: baseline; background-image:","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Rabochie_stancii_Dell_Precision.jpg"},"eventUrl":"","translationId":96,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":453,"title":"Desktop PC","alias":"desktop-pc","description":" A desktop computer is a personal computer designed for regular use at a single location on or near a desk or table due to its size and power requirements. The most common configuration has a case that houses the power supply, motherboard (a printed circuit board with a microprocessor as the central processing unit (CPU), memory, bus, and other electronic components), disk storage (usually one or more hard disk drives, solid state drives, optical disc drives, and in early models a floppy disk drive); a keyboard and mouse for input; and a computer monitor, speakers, and, often, a printer for output. The case may be oriented horizontally or vertically and placed either underneath, beside, or on top of a desk.\r\nDesktop computers are designed to work at the table. Usually, they are bigger and more powerful than other types of personal computers. Desktop computers are made up of individual components. The main component is called the system unit - usually, it is a rectangular case that is on or under the table. Other components, such as the monitor, mouse and keyboard, are connected to the system unit.\r\nAs a rule, all additional external devices are connected to the PC system unit using special connectors. Their main part is located on its rear wall. Some, the most popular ones, are brought to the front, for example, USB connectors and audio outputs. The system unit itself consists of internal devices, called components.","materialsDescription":" Main components of the desktop system unit:\r\n<ul><li><span style=\"font-weight: bold;\">A CPU</span> is the main information processing and computer control device.</li><li><span style=\"font-weight: bold;\">A video card</span> is a device for processing two-dimensional and three-dimensional graphics, as well as displaying an image on a monitor (screen).</li><li><span style=\"font-weight: bold;\">RAM</span> - used for short-term storage of data during operation of the computer. When it is turned off, the information recorded in the RAM disappears.</li><li><span style=\"font-weight: bold;\">A storage device (hard disk)</span> - used as the primary means for storing all user data and programs. Its capacity is much more than the amount of RAM, however, the speed of reading and writing information is less than when working with RAM.</li><li><span style=\"font-weight: bold;\">A motherboard</span> is a complex device that combines all the components of a personal computer and ensures their well-coordinated work.</li><li><span style=\"font-weight: bold;\">An optical drive</span> - a device for reading and writing information on optical CDs, DVDs and Blue-ray discs.</li><li><span style=\"font-weight: bold;\">A case</span> - protects all components from harmful external influences (for example, moisture) and gives an aesthetic look to your computer.</li><li><span style=\"font-weight: bold;\">A power supply unit</span> converts the alternating current of ordinary electric networks of high voltage (220 Volt) into direct current of low voltage (12 V, 5 V and 3 V), required for powering computer components.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_PC.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-wyse-3040-thin-client":{"id":769,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Dell_Wyse_3040_tonkii_klient.jpg","logo":true,"scheme":false,"title":"Dell Wyse 3040 Thin Client","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-wyse-3040-thin-client","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Efficient and effective.\r\nWyse 3040 Thin Client - Simplified setup<span style=\"white-space:pre\">\t</span>Simplified setup: With simplified automatic setup, configuration and management, the Wyse 3040 can be deployed right out-of-the box. Connect to a variety of virtual desktops including Citrix, Microsoft and VMware environments and provides essential protocol and peripheral support, including optional PCoIP.\r\nWyse 3040 Thin Client - Save energy. Save money<span style=\"white-space:pre\">\t</span>Save energy. Save money: An affordable price point keeps your initial investment low while power-efficient operation of less than 5 watts maintains cost-effectiveness from one day to the next.\r\nWyse 3040 Thin Client - Makes management a snap<span style=\"white-space:pre\">\t</span>Makes management a snap: Easily manage your Wyse 3040 thin client with Dell Wyse Device Manager (WDM) or Cloud Client Manager (CCM). Powerful, easy-to-use and highly scalable, WDM software enables you to configure, monitor and manage Dell Wyse devices.","shortDescription":"At the top of its class: With strong performance featuring Intel® Quad Core processors, Wyse 3040 delivers the best virtual desktop experience of any thin client solution in its class.\r\nWell connected: Wyse 3040 features wireless and wired network connectivity, with two DisplayPort interfaces, 4 USB ports—including 1 USB 3.1 and an AC wireless with optional Bluetooth.\r\nPick the OS that works for you: Wyse 3040 supports both ThinOS and ThinLinux (coming soon), so task and productivity users can choose the system that fits their needs.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Dell Wyse 3040 Thin Client","keywords":"Wyse, 3040, Client, Save, Thin, Dell, setup, management","description":"Efficient and effective.\r\nWyse 3040 Thin Client - Simplified setup<span style=\"white-space:pre\">\t</span>Simplified setup: With simplified automatic setup, configuration and management, the Wyse 3040 can be deployed right out-of-the box. Connect to a variety of","og:title":"Dell Wyse 3040 Thin Client","og:description":"Efficient and effective.\r\nWyse 3040 Thin Client - Simplified setup<span style=\"white-space:pre\">\t</span>Simplified setup: With simplified automatic setup, configuration and management, the Wyse 3040 can be deployed right out-of-the box. Connect to a variety of","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Dell_Wyse_3040_tonkii_klient.jpg"},"eventUrl":"","translationId":770,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-bleid-massiv-equallogic-ps-m4110":{"id":865,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Bleid-massiv_EqualLogic_PS-M4110.png","logo":true,"scheme":false,"title":"DELL Блейд-массив EqualLogic PS-M4110","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-bleid-massiv-equallogic-ps-m4110","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Конвергенция центра обработки данных\r\nВычислительные ресурсы, сетевые компоненты и система хранения данных в одном корпусе для блейд-модулей PowerEdge™ M1000e, а также сокращение инфраструктуры центра обработки данных, кабельных конфигураций и требований к питанию и охлаждению.\r\n\r\nИнтеграция системы хранения данных корпоративного класса с блейд-серверами\r\nПолучите максимально гибкую систему хранения данных для блейд-среды благодаря блейд-массиву двойной ширины и половинной высоты, который можно установить в любом отсеке корпуса PowerEdge M1000e.\r\n\r\nПростое расширение системы хранения данных\r\nОтличная одноранговая архитектура EqualLogic, обеспечивающая линейное масштабирование, позволит сэкономить время благодаря одновременному масштабированию емкости и производительности системы хранения данных.\r\n\r\nУпрощение управления и снижение риска\r\nПоложитесь на возможности централизованного мониторинга и составления отчетов, а также мощные средства защиты данных, реализованные благодаря комплексному набору расширенных функций блейд-массива EqualLogic PS-M4110.\r\n\r\nСистема хранения данных Equallogic PS M4110 \r\nБлейд-массив EqualLogic PS-M4110 предлагается в четырех различных конфигурациях.\r\n\r\nPS-M4110E\r\nПовысьте емкость и производительность, а также расширьте возможности подключения системы хранения данных на вашем малом или среднем предприятии, воспользовавшись экономичными блейд-массивами с протоколом iSCSI 10GbE EqualLogic PS-M4110E.\r\n\r\nPS-M4110X\r\nРазверните блейд-массив iSCSI Dell EqualLogic PS-M4110X 10GbE с отличным сочетанием экономичной производительности и емкости для различных приложений.\r\nБолее подробная информация\r\n\r\nPS-M4110XV\r\nВысокопроизводительные блейд-массивы iSCSI Dell EqualLogic PS-M4110XV 10GbE обеспечат эффективную работу ваших критически важных приложений.\r\n\r\nPS-M4110XS\r\nПриобретите блейд-массив 10GbE iSCSI Dell EqualLogic PS-M4110XS, и вы получите решение с расширенными функциями многоуровневого хранения данных, объединяющее в себе производительные твердотельные накопители с небольшой задержкой и жесткие диски большой емкости.","shortDescription":"Объедините системы хранения, блейд-серверы и сетевые компоненты в масшабируемый виртуализированный центр обработки данных с помощью блейд-массива Dell™ EqualLogic™ PS-M4110.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Блейд-массив EqualLogic PS-M4110","keywords":"данных, хранения, EqualLogic, системы, 10GbE, iSCSI, благодаря, PS-M4110","description":"Конвергенция центра обработки данных\r\nВычислительные ресурсы, сетевые компоненты и система хранения данных в одном корпусе для блейд-модулей PowerEdge™ M1000e, а также сокращение инфраструктуры центра обработки данных, кабельных конфигураций и требований к пит","og:title":"DELL Блейд-массив EqualLogic PS-M4110","og:description":"Конвергенция центра обработки данных\r\nВычислительные ресурсы, сетевые компоненты и система хранения данных в одном корпусе для блейд-модулей PowerEdge™ M1000e, а также сокращение инфраструктуры центра обработки данных, кабельных конфигураций и требований к пит","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Bleid-massiv_EqualLogic_PS-M4110.png"},"eventUrl":"","translationId":7019,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":517,"title":"Blade System","alias":"blade-system","description":" A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical space and energy. Blade servers have many components removed to save space, minimize power consumption and other considerations, while still having all the functional components to be considered a computer. Unlike a rack-mount server, a blade server needs a blade enclosure, which can hold multiple blade servers, providing services such as power, cooling, networking, various interconnects and management. Together, blades and the blade enclosure form a blade system. Different blade providers have differing principles regarding what to include in the blade itself, and in the blade system as a whole.\r\nIn a standard server-rack configuration, one rack unit or 1U—19 inches (480 mm) wide and 1.75 inches (44 mm) tall—defines the minimum possible size of any equipment. The principal benefit and justification of blade computing relates to lifting this restriction so as to reduce size requirements. The most common computer rack form-factor is 42U high, which limits the number of discrete computer devices directly mountable in a rack to 42 components. Blades do not have this limitation. As of 2014, densities of up to 180 servers per blade system (or 1440 servers per rack) are achievable with blade systems.\r\nEnclosure (or chassis) performs many of the non-core computing services found in most computers. Non-blade systems typically use bulky, hot and space-inefficient components, and may duplicate these across many computers that may or may not perform at capacity. By locating these services in one place and sharing them among the blade computers, the overall utilization becomes higher. The specifics of which services are provided varies by vendor.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Power.</span></span> Computers operate over a range of DC voltages, but utilities deliver power as AC, and at higher voltages than required within computers. Converting this current requires one or more power supply units (or PSUs). To ensure that the failure of one power source does not affect the operation of the computer, even entry-level servers may have redundant power supplies, again adding to the bulk and heat output of the design.\r\nThe blade enclosure's power supply provides a single power source for all blades within the enclosure. This single power source may come as a power supply in the enclosure or as a dedicated separate PSU supplying DC to multiple enclosures. This setup reduces the number of PSUs required to provide a resilient power supply.\r\nThe popularity of blade servers, and their own appetite for power, has led to an increase in the number of rack-mountable uninterruptible power supply (or UPS) units, including units targeted specifically towards blade servers (such as the BladeUPS).\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Cooling.</span></span> During operation, electrical and mechanical components produce heat, which a system must dissipate to ensure the proper functioning of its components. Most blade enclosures, like most computing systems, remove heat by using fans.\r\nA frequently underestimated problem when designing high-performance computer systems involves the conflict between the amount of heat a system generates and the ability of its fans to remove the heat. The blade's shared power and cooling means that it does not generate as much heat as traditional servers. Newer blade-enclosures feature variable-speed fans and control logic, or even liquid cooling systems that adjust to meet the system's cooling requirements.\r\nAt the same time, the increased density of blade-server configurations can still result in higher overall demands for cooling with racks populated at over 50% full. This is especially true with early-generation blades. In absolute terms, a fully populated rack of blade servers is likely to require more cooling capacity than a fully populated rack of standard 1U servers. This is because one can fit up to 128 blade servers in the same rack that will only hold 42 1U rack mount servers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Networking.</span></span> Blade servers generally include integrated or optional network interface controllers for Ethernet or host adapters for Fibre Channel storage systems or converged network adapter to combine storage and data via one Fibre Channel over Ethernet interface. In many blades at least one interface is embedded on the motherboard and extra interfaces can be added using mezzanine cards.\r\nA blade enclosure can provide individual external ports to which each network interface on a blade will connect. Alternatively, a blade enclosure can aggregate network interfaces into interconnect devices (such as switches) built into the blade enclosure or in networking blades.\r\nBlade servers function well for specific purposes such as web hosting, virtualization, and cluster computing. Individual blades are typically hot-swappable. As users deal with larger and more diverse workloads, they add more processing power, memory and I/O bandwidth to blade servers. Although blade server technology in theory allows for open, cross-vendor system, most users buy modules, enclosures, racks and management tools from the same vendor.\r\nEventual standardization of the technology might result in more choices for consumers; as of 2009 increasing numbers of third-party software vendors have started to enter this growing field.\r\nBlade servers do not, however, provide the answer to every computing problem. One can view them as a form of productized server-farm that borrows from mainframe packaging, cooling, and power-supply technology. Very large computing tasks may still require server farms of blade servers, and because of blade servers' high power density, can suffer even more acutely from the heating, ventilation, and air conditioning problems that affect large conventional server farms.","materialsDescription":" <span style=\"font-weight: bold;\">What is blade server?</span>\r\nA blade server is a server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application. The blades are literally servers on a card, containing processors, memory, integrated network controllers, an optional Fiber Channel host bus adaptor (HBA) and other input/output (IO) ports.\r\nBlade servers allow more processing power in less rack space, simplifying cabling and reducing power consumption. According to a SearchWinSystems.com article on server technology, enterprises moving to blade servers can experience as much as an 85% reduction in cabling for blade installations over conventional 1U or tower servers. With so much less cabling, IT administrators can spend less time managing the infrastructure and more time ensuring high availability.\r\nEach blade typically comes with one or two local ATA or SCSI drives. For additional storage, blade servers can connect to a storage pool facilitated by a network-attached storage (NAS), Fiber Channel, or iSCSI storage-area network (SAN). The advantage of blade servers comes not only from the consolidation benefits of housing several servers in a single chassis, but also from the consolidation of associated resources (like storage and networking equipment) into a smaller architecture that can be managed through a single interface.\r\nA blade server is sometimes referred to as a high-density server and is typically used in a clustering of servers that are dedicated to a single task, such as:\r\n<ul><li>File sharing</li><li>Web page serving and caching</li><li>SSL encrypting of Web communication</li><li>The transcoding of Web page content for smaller displays</li><li>Streaming audio and video content</li></ul>\r\nLike most clustering applications, blade servers can also be managed to include load balancing and failover capabilities.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Blade_System.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-obshchaja-infrastruktura-konvergentnye-platformy":{"id":868,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Obshchaja_infrastruktura_-_Konvergentnye_platformy.jpg","logo":true,"scheme":false,"title":"DELL Общая инфраструктура - Конвергентные платформы","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-obshchaja-infrastruktura-konvergentnye-platformy","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Блейд-сервер PowerEdge M420\r\nБлейд-сервер Dell PowerEdge™ M420 высотой в одну четверть, отличающийся исключительной плотностью размещения вычислительных ресурсов, обеспечивает эффективность и непрерывность бизнес-процессов и позволяет быстро выполнять любые задачи.\r\n\r\nБлейд-сервер PowerEdge M520\r\nСервер PowerEdge™ M520 предлагает невероятно эффективную работу и исключительные преимущества для бизнес-приложений, а также беспрецедентный набор функций корпоративного класса.\r\n\r\nБлейд-сервер PowerEdge M620\r\nБлейд-сервер PowerEdge™ M620 справится с самыми ресурсоемкими рабочими нагрузками. Это идеальное сочетание высокой плотности установки, производительности, эффективности и масштабируемости.\r\n\r\nБлейд-сервер PowerEdge M915\r\nПовысьте эффективность, производительность и гибкость центра обработки данных благодаря блейд-серверу максимальной высоты PowerEdge M915 с процессорами AMD, максимальной полосой пропускания и функциями управления корпоративного класса.","shortDescription":"Dell PowerEdge VRTX PowerEdge VRTX интегрирует серверы, системы хранения данных, сетевые компоненты и средства управления в компактной инфраструктуре совместного использования, оптимизированной для офисных сред.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Общая инфраструктура - Конвергентные платформы","keywords":"Блейд-сервер, PowerEdge, PowerEdge™, эффективность, M520, корпоративного, класса, M620","description":"Блейд-сервер PowerEdge M420\r\nБлейд-сервер Dell PowerEdge™ M420 высотой в одну четверть, отличающийся исключительной плотностью размещения вычислительных ресурсов, обеспечивает эффективность и непрерывность бизнес-процессов и позволяет быстро выполнять любые за","og:title":"DELL Общая инфраструктура - Конвергентные платформы","og:description":"Блейд-сервер PowerEdge M420\r\nБлейд-сервер Dell PowerEdge™ M420 высотой в одну четверть, отличающийся исключительной плотностью размещения вычислительных ресурсов, обеспечивает эффективность и непрерывность бизнес-процессов и позволяет быстро выполнять любые за","og:image":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Obshchaja_infrastruktura_-_Konvergentnye_platformy.jpg"},"eventUrl":"","translationId":7021,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":517,"title":"Blade System","alias":"blade-system","description":" A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical space and energy. Blade servers have many components removed to save space, minimize power consumption and other considerations, while still having all the functional components to be considered a computer. Unlike a rack-mount server, a blade server needs a blade enclosure, which can hold multiple blade servers, providing services such as power, cooling, networking, various interconnects and management. Together, blades and the blade enclosure form a blade system. Different blade providers have differing principles regarding what to include in the blade itself, and in the blade system as a whole.\r\nIn a standard server-rack configuration, one rack unit or 1U—19 inches (480 mm) wide and 1.75 inches (44 mm) tall—defines the minimum possible size of any equipment. The principal benefit and justification of blade computing relates to lifting this restriction so as to reduce size requirements. The most common computer rack form-factor is 42U high, which limits the number of discrete computer devices directly mountable in a rack to 42 components. Blades do not have this limitation. As of 2014, densities of up to 180 servers per blade system (or 1440 servers per rack) are achievable with blade systems.\r\nEnclosure (or chassis) performs many of the non-core computing services found in most computers. Non-blade systems typically use bulky, hot and space-inefficient components, and may duplicate these across many computers that may or may not perform at capacity. By locating these services in one place and sharing them among the blade computers, the overall utilization becomes higher. The specifics of which services are provided varies by vendor.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Power.</span></span> Computers operate over a range of DC voltages, but utilities deliver power as AC, and at higher voltages than required within computers. Converting this current requires one or more power supply units (or PSUs). To ensure that the failure of one power source does not affect the operation of the computer, even entry-level servers may have redundant power supplies, again adding to the bulk and heat output of the design.\r\nThe blade enclosure's power supply provides a single power source for all blades within the enclosure. This single power source may come as a power supply in the enclosure or as a dedicated separate PSU supplying DC to multiple enclosures. This setup reduces the number of PSUs required to provide a resilient power supply.\r\nThe popularity of blade servers, and their own appetite for power, has led to an increase in the number of rack-mountable uninterruptible power supply (or UPS) units, including units targeted specifically towards blade servers (such as the BladeUPS).\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Cooling.</span></span> During operation, electrical and mechanical components produce heat, which a system must dissipate to ensure the proper functioning of its components. Most blade enclosures, like most computing systems, remove heat by using fans.\r\nA frequently underestimated problem when designing high-performance computer systems involves the conflict between the amount of heat a system generates and the ability of its fans to remove the heat. The blade's shared power and cooling means that it does not generate as much heat as traditional servers. Newer blade-enclosures feature variable-speed fans and control logic, or even liquid cooling systems that adjust to meet the system's cooling requirements.\r\nAt the same time, the increased density of blade-server configurations can still result in higher overall demands for cooling with racks populated at over 50% full. This is especially true with early-generation blades. In absolute terms, a fully populated rack of blade servers is likely to require more cooling capacity than a fully populated rack of standard 1U servers. This is because one can fit up to 128 blade servers in the same rack that will only hold 42 1U rack mount servers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Networking.</span></span> Blade servers generally include integrated or optional network interface controllers for Ethernet or host adapters for Fibre Channel storage systems or converged network adapter to combine storage and data via one Fibre Channel over Ethernet interface. In many blades at least one interface is embedded on the motherboard and extra interfaces can be added using mezzanine cards.\r\nA blade enclosure can provide individual external ports to which each network interface on a blade will connect. Alternatively, a blade enclosure can aggregate network interfaces into interconnect devices (such as switches) built into the blade enclosure or in networking blades.\r\nBlade servers function well for specific purposes such as web hosting, virtualization, and cluster computing. Individual blades are typically hot-swappable. As users deal with larger and more diverse workloads, they add more processing power, memory and I/O bandwidth to blade servers. Although blade server technology in theory allows for open, cross-vendor system, most users buy modules, enclosures, racks and management tools from the same vendor.\r\nEventual standardization of the technology might result in more choices for consumers; as of 2009 increasing numbers of third-party software vendors have started to enter this growing field.\r\nBlade servers do not, however, provide the answer to every computing problem. One can view them as a form of productized server-farm that borrows from mainframe packaging, cooling, and power-supply technology. Very large computing tasks may still require server farms of blade servers, and because of blade servers' high power density, can suffer even more acutely from the heating, ventilation, and air conditioning problems that affect large conventional server farms.","materialsDescription":" <span style=\"font-weight: bold;\">What is blade server?</span>\r\nA blade server is a server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application. The blades are literally servers on a card, containing processors, memory, integrated network controllers, an optional Fiber Channel host bus adaptor (HBA) and other input/output (IO) ports.\r\nBlade servers allow more processing power in less rack space, simplifying cabling and reducing power consumption. According to a SearchWinSystems.com article on server technology, enterprises moving to blade servers can experience as much as an 85% reduction in cabling for blade installations over conventional 1U or tower servers. With so much less cabling, IT administrators can spend less time managing the infrastructure and more time ensuring high availability.\r\nEach blade typically comes with one or two local ATA or SCSI drives. For additional storage, blade servers can connect to a storage pool facilitated by a network-attached storage (NAS), Fiber Channel, or iSCSI storage-area network (SAN). The advantage of blade servers comes not only from the consolidation benefits of housing several servers in a single chassis, but also from the consolidation of associated resources (like storage and networking equipment) into a smaller architecture that can be managed through a single interface.\r\nA blade server is sometimes referred to as a high-density server and is typically used in a clustering of servers that are dedicated to a single task, such as:\r\n<ul><li>File sharing</li><li>Web page serving and caching</li><li>SSL encrypting of Web communication</li><li>The transcoding of Web page content for smaller displays</li><li>Streaming audio and video content</li></ul>\r\nLike most clustering applications, blade servers can also be managed to include load balancing and failover capabilities.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Blade_System.png"},{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-servery-poweredge-v-korpuse-tower":{"id":855,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Servery_PowerEdge_v_korpuse_Tower.jpg","logo":true,"scheme":false,"title":"DELL Серверы PowerEdge в корпусе Tower","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-servery-poweredge-v-korpuse-tower","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Предлагаемые модели\r\nСравнить все\r\nСерверы — PowerEdge — модель T130\r\nСервер PowerEdge T20 в корпусе Tower\r\nСервер PowerEdge T30 в корпусе Tower\r\nСервер в корпусе Tower PowerEdge T130\r\nМощный однопроцессорный сервер начального уровня в корпусе Mini-Tower для консолидации данных и ускорения работы приложений в масштабах малого или среднего предприятия, небольшого офиса или домашнего офиса.\r\nПодробнее\r\nPowerEdge T20\r\nИдеальный вариант для обеспечения совместной работы, хранения файлов, обмена данными и их защиты внутри компактного и бесшумного сервера в корпусе Mini-Tower.\r\nПодробнее\r\nНовинка Сервер PowerEdge T30 в корпусе Mini-Tower\r\nИдеальный вариант для совместной работы, хранения файлов, общего доступа и защиты данных в небольших и домашних офисах.\r\n\r\nСервер PowerEdge T320 в корпусе Tower\r\nОбеспечьте надежную работу основных бизнес-приложений, используя надежность и гибкость сервера PowerEdge™ T320 в корпусе Tower.\r\n\r\nСервер PowerEdge T330 в корпусе Tower\r\nМощный и расширяемый однопроцессорный сервер в корпусе Tower позволяет ускорить работу приложений, используемых на малых и средних предприятиях, а также в удаленных офисах и филиалах, и развиваться в соответствии с вашими потребностями в данных.\r\n\r\nСервер PowerEdge T420 в корпусе Tower\r\nБлагодаря высокой мощности, большому объему памяти и расширенной пропускной способности ввода-вывода, которые отличают сервер PowerEdge™ T420 в корпусе Tower, вашей организации будет обеспечена высокая производительность, масштабируемость и надежность.\r\n\r\nСервер PowerEdge T430 в корпусе Tower\r\nПовышение производительности в офисной среде благодаря с помощью мощного двухпроцессорного сервера в корпусе Tower с расширяемой конструкцией и низким уровнем шума.\r\n\r\nСервер PowerEdge T630 в корпусе Tower\r\nСправляйтесь с широким диапазоном ресурсоемких рабочих нагрузок благодаря гибкому двухпроцессорному серверу с максимальной производительностью и огромной емкостью внутренней системы хранения данных.","shortDescription":"Независимо от того, работаете ли вы дома или в небольшом офисе, серверы Dell PowerEdge в корпусе Tower идеально подойдут для ваших потребностей в области ИТ. Ознакомьтесь с нашими продуктами уже сегодня. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Серверы PowerEdge в корпусе Tower","keywords":"корпусе, Tower, PowerEdge, Сервер, данных, сервер, Mini-Tower, работы","description":"Предлагаемые модели\r\nСравнить все\r\nСерверы — PowerEdge — модель T130\r\nСервер PowerEdge T20 в корпусе Tower\r\nСервер PowerEdge T30 в корпусе Tower\r\nСервер в корпусе Tower PowerEdge T130\r\nМощный однопроцессорный сервер начального уровня в корпусе Mini-Tower для к","og:title":"DELL Серверы PowerEdge в корпусе Tower","og:description":"Предлагаемые модели\r\nСравнить все\r\nСерверы — PowerEdge — модель T130\r\nСервер PowerEdge T20 в корпусе Tower\r\nСервер PowerEdge T30 в корпусе Tower\r\nСервер в корпусе Tower PowerEdge T130\r\nМощный однопроцессорный сервер начального уровня в корпусе Mini-Tower для к","og:image":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Servery_PowerEdge_v_korpuse_Tower.jpg"},"eventUrl":"","translationId":7015,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-stoechnyi-server-poweredge-c6320":{"id":866,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Modulnaja_infrastruktura.png","logo":true,"scheme":false,"title":"DELL Стоечный сервер PowerEdge C6320","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-stoechnyi-server-poweredge-c6320","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Производительность и эффективность\r\n\r\nСоздавайте высокопроизводительные кластеры и решения с горизонтальным масштабированием при помощи серверов PowerEdge C6320 со следующими характеристиками:\r\n \r\nМодульное решение с форм-фактором 2U и высокой плотностью, оснащенное процессорами Intel® Xeon® E5-2600 v4 нового поколения с увеличенным числом ядер по сравнению с предыдущими моделями E5-2600 v3, а также с поддержкой памяти объемом до 512 Гбайт на серверный узел с общим объемом до 2 Тбайт.\r\nИнтегрированный контроллер удаленного доступа Dell iDRAC8 с контроллером жизненного цикла (оптимальная стоимость при использовании с C6320) для обеспечения стабильного, эффективного управления серверами в физических, виртуальных, локальных и удаленных средах\r\nУниверсальные конфигурации с жесткими дисками высокой емкости с шириной 2,5 и 3,5 дюйма\r\n16 разъемов для модулей памяти DIMM позволяют адаптировать объем памяти (до 512 Гбайт1) под ваши потребности\r\nПамять DDR4 обеспечивает увеличение пропускной способности на 15% и сокращение энергопотребления до 30% по сравнению с ОЗУ DDR3\r\n\r\nМаксимальная универсальность\r\n\r\nЭкономия пространства и поддержка меняющихся нагрузок за счет оптимального сочетания производительности процессоров, вариантов узлов и функций энергосбережения, а также благодаря возможности использования до четырех независимых салазок (серверных узлов) и поддержке различного числа жестких дисков в одном шасси с форм-фактором 2U.\r\nДо 44 ядер на узел, 176 ядер на шасси\r\nДо 24 (шириной 2,5 дюйма) или 12 (шириной 3,5 дюйма) накопителей SAS, SATA или твердотельных накопителей с возможностью горячей замены в каждом шасси\r\nДва высокоэффективных блока питания мощностью 1 400 Вт и 1 600 Вт с возможностью горячей замены\r\nОпциональное встроенное загрузочное устройство SATA DOM (64 Гбайта) позволяет освободить ценное пространство на жестком диске для данных\r\nОдин разъем x16 PCIe 3.0 и один мезонинный разъем x8 PCIe 3.0 для салазок с форм-фактором 1U\r\nВстроенный модуль LOM: 2 порта 10GbE (SFP+)\r\n\r\nПовышение эффективности работы\r\n\r\nПростое управление серверами PowerEdge C6320 благодаря автоматическому выполнению стандартных задач по управлению жизненным циклом с помощью технологий Dell OpenManage на основе iDRAC8 со встроенным контроллером жизненного цикла без использования агентов, который работает как автономно, так и в сочетании с другими компонентами Dell OpenManage и средствами управления сторонних производителей, включая следующие:\r\nOpenManage Essentials\r\nИнтеграция Dell для BMC BladeLogic\r\nMicrosoft System Center\r\nVMware vCenter\r\nЭти средства позволяют оптимизировать операции в существующей среде управления ИТ.\r\nУпрощение задач управления\r\n\r\nIDRAC с контроллером жизненного цикла предоставляет полный набор функций управления сервером (включая конфигурацию, развертывание ОС, обновления микропрограмм, мониторинг состояния и техническое обслуживание), которые работают независимо от состояния операционной системы и наличия гипервизора.\r\n <span style=\"white-space:pre\">\t</span>\r\nБез агентов — мониторинг производительности основной памяти, ЦП и системы ввода-вывода и настройка пользовательских пороговых значений для оповещения по протоколу SNMP, Racadm или WSman — и все это без агентов ОС или какого-либо влияния на операционную систему или серверные компоненты.\r\n \r\nКонтроллер жизненного цикла — локальное развертывание и упрощенное обслуживание с помощью средства, интегрируемого с Dell OpenManage Essentials и консолями сторонних производителей.\r\n poweredge-c6320-Автоматическое развертывание и выделение ресурсов <span style=\"white-space:pre\">\t</span>Автоматическое развертывание и выделение ресурсов — автоматическая настройка серверов и опциональная возможность планирования проверок работоспособности с автоматическими изменениями конфигурации (требуется iDRAC Enterprise Edition).\r\n\r\nКрупномасштабные среды\r\n\r\nИспользуйте возможности гипермасштабирования C6320 для сред с высокими требованиями к производительности и с интенсивной рабочей нагрузкой.\r\n \r\nВысокопроизводительные вычисления — внедрение высокопроизводительных массово-параллельных вычислений с малой задержкой для кластеров с высокой плотностью, которым требуется высокая масштабируемость с максимальной производительностью на одно стойко-место.\r\nАналитика и большие объемы данных — поддержка крупномасштабного анализа данных благодаря максимальной плотности вычислений и возможности адаптации серверных конфигураций к изменяющимся нагрузкам.\r\nОблако — существенная масштабируемость и высокая плотность помогают поставщикам облачных сервисов и услуг хостинга сократить капитальные расходы и максимально повысить уровень производительности на кв. фут из расчета на ватт.\r\nWeb 2.0 — обеспечение соответствия серверной инфраструктуры крупным нагрузкам веб-хостинга, а также исключение выделения избыточных ресурсов благодаря высокой масштабируемости и универсальным вариантам быстрой конфигурации.","shortDescription":"Оптимизация производительности вычислений.\r\nМаксимизируйте производительность гипермасштабируемых систем благодаря поддержке до четырех независимых серверных узлов, различных конфигураций накопителей и общей инфраструктуры в компактном корпусе с форм-фактором 2U.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Стоечный сервер PowerEdge C6320","keywords":"Dell, управления, C6320, производительности, OpenManage, высокой, развертывание, памяти","description":"Производительность и эффективность\r\n\r\nСоздавайте высокопроизводительные кластеры и решения с горизонтальным масштабированием при помощи серверов PowerEdge C6320 со следующими характеристиками:\r\n \r\nМодульное решение с форм-фактором 2U и высокой плотностью,","og:title":"DELL Стоечный сервер PowerEdge C6320","og:description":"Производительность и эффективность\r\n\r\nСоздавайте высокопроизводительные кластеры и решения с горизонтальным масштабированием при помощи серверов PowerEdge C6320 со следующими характеристиками:\r\n \r\nМодульное решение с форм-фактором 2U и высокой плотностью,","og:image":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Modulnaja_infrastruktura.png"},"eventUrl":"","translationId":7020,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":435,"title":"Rack Server","alias":"rack-server","description":"A rack mount server is a great way to maximize your shelf space by packing a lot of servers into a small space. Rackmount servers are typically easier for administrators to manage due to proximity, modularity and better cable management. Lockable rack cabinet doors and steel server front panels provide an additional level of physical security. Additionally, rack unit designed servers are better able to keep the server components cool than traditional tower form factor. Industry standard 19-inch racks will allow you to easily expand your business without taking up more valuable floor space.\r\nThere is a lot of thought that needs to go into which size rack server is best bet for your project. Both current requirements and future expansion plans need to be taken into account to ensure your server remains capable in the future.\r\nBoth large and small projects can be built on the 1U server platform. "U" stands for unit, “unit”, and this means thickness: server rack 1U = 1.75 inches or 44 mm wide. A reasonable amount of storage can fit within a 1U, processing power has no limits, and some models even allow up to two PCI-Express cards. Modern computer hardware uses much less power than it ever has in the past, which means less heat generation. Some 1U servers to still produce some acoustic noise, but is nowhere near the level of needing earmuffs like the old days. The only reason to go up in size is for additional expansion options.\r\n2U models allow for multiple "low-profile" PCI-Express cards while keeping a compact form factor and also providing some additional storage space. If the plan is to use multiple full height cards, then 3U or 4U servers should be the focus. The 4U models are very popular and offer flexible options. The 3U models do have limitations on expansion card compatibility and are really only for situations where rack space needs to be absolutely optimized (14x3U servers or 10x4U servers can fit in a 42u rack).","materialsDescription":"<span style=\"font-weight: bold;\">What is a ‘rack unit’?</span>\r\nA rack unit is the designated unit of measurement used when describing or quantifying the vertical space you have available in any equipment rack. One unit is equal to 1.75 inches, or 4.45 centimeters. Any equipment that has the ability to be mounted onto a rack is generally designed in a standard size to fit into many different server rack heights. It’s actually been standardized by the Electronic Industries Alliance (EIA). The most common heights are between 8U to 50U, but customization is also a viable option if you’re working with nonstandard sizes.\r\n<span style=\"font-weight: bold;\">Are there any specific ventilation requirements with server racks?</span>\r\nOver 65% of IT equipment failures are directly attributed to inadequate, poorly maintained, or failed air conditioning in the server room. So yes, proper ventilation is a critical part of maintaining any data center. Some cabinet manufacturers construct side panel ventilation instead of front and back ventilation, but experts say it’s inadequate for rack mount servers. This can be especially dangerous if more than one cabinet is being set up at once. The importance of proper ventilation should not be taken lightly, and you should always opt for front to back ventilation except in network applications where the IT equipment exhausts out the side.\r\n<span style=\"font-weight: bold;\">What is meant by ‘server rack depth’?</span>\r\nServer rack depth is a critical aspect of the ventilation process. Connectworld.net says, “Server cabinet depth is important not only because it has to allow room for the depth of the particular equipment to be rack-mounted (deep servers vs. routers or switches), but also it has to allow sufficient room for cables, PDU’s as well as airflow.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Rack_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"dell-upravlenie-klientskimi-sistemami":{"id":869,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Upravlenie_klientskimi_sistemami.jpg","logo":true,"scheme":false,"title":"DELL Управление клиентскими системами","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"dell-upravlenie-klientskimi-sistemami","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"\r\nУстройства управления Dell KACE K1000\r\nУстройство управления Dell KACE K1000 удовлетворяют все ваши требования к управлению системами — от первоначального развертывания до текущего управления и списания, для 100-20 000 конечных узлов.\r\n\r\nУстройства для развертывания Dell KACE K2000\r\nУстройства для развертывания Dell KACE K2000 удовлетворяют потребности в развертывании систем, включая оценку ресурсов, развертывание ОС, установку приложений, настройку и восстановление.","shortDescription":"С помощью упрощенного комплексного подхода к развертыванию систем организации стремятся сэкономить время и деньги и повысить эффективность работы ИТ-отделов.\r\nЗащита данных\r\nDell KACE K1000\r\nDell KACE K2000","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DELL Управление клиентскими системами","keywords":"Dell, KACE, развертывания, Устройства, управления, удовлетворяют, K2000, K1000","description":"\r\nУстройства управления Dell KACE K1000\r\nУстройство управления Dell KACE K1000 удовлетворяют все ваши требования к управлению системами — от первоначального развертывания до текущего управления и списания, для 100-20 000 конечных узлов.\r\n\r\nУстройства для разве","og:title":"DELL Управление клиентскими системами","og:description":"\r\nУстройства управления Dell KACE K1000\r\nУстройство управления Dell KACE K1000 удовлетворяют все ваши требования к управлению системами — от первоначального развертывания до текущего управления и списания, для 100-20 000 конечных узлов.\r\n\r\nУстройства для разве","og:image":"https://old.roi4cio.com/fileadmin/user_upload/DELL_Upravlenie_klientskimi_sistemami.jpg"},"eventUrl":"","translationId":7022,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"intel-server-chassis-and-system":{"id":2035,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Intel_R__Storage_System.png","logo":true,"scheme":false,"title":"Intel Server Chassis and System","vendorVerified":0,"rating":"1.90","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":8,"alias":"intel-server-chassis-and-system","companyTitle":"Intel","companyTypes":["vendor"],"companyId":2800,"companyAlias":"intel","description":"Customers want data center products designed for outstanding performance and reliability that will address their unique needs. With Intel Server Systems and Intel Server Chassis, you can count on trusted performance, quality, and reliability to help solve the most complex business challenges.\r\n<span style=\"font-weight: bold; \">Features and Benefits:<br /></span><span style=\"font-weight: bold; \">World-Class Quality.</span> Intel Server Boards, Intel Server Systems, and Intel Server Chassis are built on a foundation of industry-leading, high-quality technology. Rigorous testing and extensive validation means reliable solutions you can trust.\r\n<span style=\"font-weight: bold; \">Feature-Rich Products.</span> Intel Server Boards and Intel Server Systems are designed to span multiple server use cases and customization requirements with performance, power, and cost flexibility to meet your existing requirements with headroom for growth.\r\n<span style=\"font-weight: bold; \">Commitment.</span> Intel is committed to providing you an unmatched customer experience with a standard three-year warranty, 24/7 access to our experts, and the confidence of knowing you have Intel in your corner.\r\nGet the most from innovative high performance Intel Server Systems. From 1U single-socket, short form factor web-hosting appliances to high reliability 2U mission critical systems, we have what you need.\r\nIntel Servers family delivers power and performance at peak efficiency in a 1U and 2U rack mount server form factor that features the energy- efficient dual Intel Xeon processor Scalable family. High memory capacity, networking, storage, and I/O flexibility combine with innovative design to provide an exceptional and reliable server for business IT, appliance, data center, cloud, and high performance computing applications.\r\n<span style=\"font-weight: bold; \">Powerful Compute Combined with Flexible I/O, Storage, and Networking Capacity:</span>\r\n<ul><li>Dual CPU sockets with support for the Intel Xeon processor Scalable family</li><li>Up to 24 DDR4 DIMMs</li><li>Three riser card slots with support for up to eight PCIe* 3.0 add-in cards for high configuration flexibility</li><li>Four on-board PCIe* OCuLink* connectors for direct attach NVMe* 2.5” SSD support</li><li>Networking flexibility via 10 G SFP+ and 10 GBase-T OCP mezzanine modules</li><li>Available in 1U and 2U systems with support for up to 24 NVMe* drives in a 2U chassis</li><li>Support for the full line of Intel RAID Modules</li></ul>\r\nThe servers are built with the latest Intel Xeon processor Scalable family. This latest generation processor is designed for performance with high scalability and resiliency with no I/O compromise, and supports a wide range of existing and emerging workloads.\r\nThe product family uses a number of key processor advancements:\r\n<ul><li>Intel QuickAssist Technology (Intel QAT) delivers up to 100 Gbps performance for authentication, public key functions, and compression/decompression workloads, while freeing up CPU cycles and reducing demands on the server</li><li>NVMe* enablement alleviates the I/O bottleneck with high performance and capacity</li><li>Intel Omni-Path Architecture (Intel OPA) integration delivering 100 Gb/s port bandwidth for improved performance and lower latency in medium to large clusters</li><li>Integrated 10 G Ethernet with RDMA eliminates TCP/IP overhead by offloading transport to NIC for faster switching and packet filtering</li><li>Intel Virtual RAID on CPU (Intel VROC) enables high-performance, highly scalable CPU-based RAID with NVMe with high IOPS and low latency</li></ul>\r\nThe product family is a foundational component of Intel Data Center Blocks (Intel DCB). These fully-validated, unbranded server systems include Intel's latest Data Center technology – already optimized to work better together – allowing partners to accelerate time to market with reliable data center solutions. The process of configuring and validating the components of solutions that are tuned to meet specific customer requirements is a complex and resource-intensive process. Intel Data Center Blocks based on the S2600WF family can help reduce this complexity, making it easier to build innovative server solutions that can support the demands of today’s data center workloads.\r\nTo address customer security concerns and guard against counterfeiting and malware, the S2600WF family features the Intel Transparent Supply Chain which enables the ability to verify the authenticity of board components and firmware.\r\nFeatures include:\r\n<ul><li>Digitally signed statement of conformance</li><li>Platform certificates provided with a secured firmware Trusted Platform Module (TPM)</li><li>Server component data tracked and saved for 20 years</li><li>Firmware load verification</li></ul>\r\nIntel Server Products are backed by Intel’s design excellence and manufacturing expertise to deliver processing power with high levels of flexibility, manageability, and reliability. Product and design quality is paired with three-year standard warranties and robust technical and incident resolution support to ensure customer satisfaction.","shortDescription":"With Intel Server Systems and Intel Server Chassis, you can count on trusted performance, quality, and reliability to help solve the most complex business challenges.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Intel Server Chassis and System","keywords":"","description":"Customers want data center products designed for outstanding performance and reliability that will address their unique needs. With Intel Server Systems and Intel Server Chassis, you can count on trusted performance, quality, and reliability to help solve the ","og:title":"Intel Server Chassis and System","og:description":"Customers want data center products designed for outstanding performance and reliability that will address their unique needs. With Intel Server Systems and Intel Server Chassis, you can count on trusted performance, quality, and reliability to help solve the ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Intel_R__Storage_System.png"},"eventUrl":"","translationId":2036,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":62,"title":"Rack server"}],"testingArea":"","categories":[{"id":435,"title":"Rack Server","alias":"rack-server","description":"A rack mount server is a great way to maximize your shelf space by packing a lot of servers into a small space. Rackmount servers are typically easier for administrators to manage due to proximity, modularity and better cable management. Lockable rack cabinet doors and steel server front panels provide an additional level of physical security. Additionally, rack unit designed servers are better able to keep the server components cool than traditional tower form factor. Industry standard 19-inch racks will allow you to easily expand your business without taking up more valuable floor space.\r\nThere is a lot of thought that needs to go into which size rack server is best bet for your project. Both current requirements and future expansion plans need to be taken into account to ensure your server remains capable in the future.\r\nBoth large and small projects can be built on the 1U server platform. "U" stands for unit, “unit”, and this means thickness: server rack 1U = 1.75 inches or 44 mm wide. A reasonable amount of storage can fit within a 1U, processing power has no limits, and some models even allow up to two PCI-Express cards. Modern computer hardware uses much less power than it ever has in the past, which means less heat generation. Some 1U servers to still produce some acoustic noise, but is nowhere near the level of needing earmuffs like the old days. The only reason to go up in size is for additional expansion options.\r\n2U models allow for multiple "low-profile" PCI-Express cards while keeping a compact form factor and also providing some additional storage space. If the plan is to use multiple full height cards, then 3U or 4U servers should be the focus. The 4U models are very popular and offer flexible options. The 3U models do have limitations on expansion card compatibility and are really only for situations where rack space needs to be absolutely optimized (14x3U servers or 10x4U servers can fit in a 42u rack).","materialsDescription":"<span style=\"font-weight: bold;\">What is a ‘rack unit’?</span>\r\nA rack unit is the designated unit of measurement used when describing or quantifying the vertical space you have available in any equipment rack. One unit is equal to 1.75 inches, or 4.45 centimeters. Any equipment that has the ability to be mounted onto a rack is generally designed in a standard size to fit into many different server rack heights. It’s actually been standardized by the Electronic Industries Alliance (EIA). The most common heights are between 8U to 50U, but customization is also a viable option if you’re working with nonstandard sizes.\r\n<span style=\"font-weight: bold;\">Are there any specific ventilation requirements with server racks?</span>\r\nOver 65% of IT equipment failures are directly attributed to inadequate, poorly maintained, or failed air conditioning in the server room. So yes, proper ventilation is a critical part of maintaining any data center. Some cabinet manufacturers construct side panel ventilation instead of front and back ventilation, but experts say it’s inadequate for rack mount servers. This can be especially dangerous if more than one cabinet is being set up at once. The importance of proper ventilation should not be taken lightly, and you should always opt for front to back ventilation except in network applications where the IT equipment exhausts out the side.\r\n<span style=\"font-weight: bold;\">What is meant by ‘server rack depth’?</span>\r\nServer rack depth is a critical aspect of the ventilation process. Connectworld.net says, “Server cabinet depth is important not only because it has to allow room for the depth of the particular equipment to be rack-mounted (deep servers vs. routers or switches), but also it has to allow sufficient room for cables, PDU’s as well as airflow.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Rack_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"intelr-storage-system":{"id":279,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Intel_R__Storage_System.png","logo":true,"scheme":false,"title":"Intel® Storage System","vendorVerified":0,"rating":"1.90","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":8,"alias":"intelr-storage-system","companyTitle":"Intel","companyTypes":["vendor"],"companyId":2800,"companyAlias":"intel","description":"Chassis Dimensions<span style=\"white-space:pre\">\t</span>16.93" x 24.95" x 3.44"\r\n\r\nIncluded Items<span style=\"white-space:pre\">\t</span>(24) 2.5" Hot-swap drive carriers, (1) Backplane, (2) 460W Redundant power supplies, (1) Power distribution board, (3) Hot-swap redundant system fans, (1) Control panel, (2) Internal to external sas connector converter boards, (2) Dual-port internal interface card, (2) Expanders, (16) internal SAS cables, (1) Rack handle set, (1) Value rail kit\r\n\r\nFront Drive Form Factor<span class=\"Apple-tab-span\" style=\"white-space:pre\">\t</span>Hot-swap 2.5"\r\n","shortDescription":"Intel® Storage System is an A 2U JBOD Storage system with 24 2.5\" dual-ported drives, dual expanders, hot-swap redundant fans,and hot-swap redundant power supplies.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Intel® Storage System","keywords":"Hot-swap, internal, Factor, Dual-port, interface, card, boards, converter","description":"Chassis Dimensions<span style=\"white-space:pre\">\t</span>16.93" x 24.95" x 3.44"\r\n\r\nIncluded Items<span style=\"white-space:pre\">\t</span>(24) 2.5" Hot-swap drive carriers, (1) Backplane, (2) 460W Redundant power supplies, (1) Power distributi","og:title":"Intel® Storage System","og:description":"Chassis Dimensions<span style=\"white-space:pre\">\t</span>16.93" x 24.95" x 3.44"\r\n\r\nIncluded Items<span style=\"white-space:pre\">\t</span>(24) 2.5" Hot-swap drive carriers, (1) Backplane, (2) 460W Redundant power supplies, (1) Power distributi","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Intel_R__Storage_System.png"},"eventUrl":"","translationId":280,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"nsx-sd-wan-by-velocloud":{"id":3314,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/VMware_NSX_SD-WAN.png","logo":true,"scheme":false,"title":"NSX SD-WAN by VeloCloud","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":97,"alias":"nsx-sd-wan-by-velocloud","companyTitle":"VMware","companyTypes":["vendor"],"companyId":168,"companyAlias":"vmware","description":"VMware NSX SD-WAN by VeloCloud enables enterprises to support application growth, network agility and simplified branch implementations while delivering optimized access to cloud services, private data centers and enterprise applications simultaneously over both ordinary broadband Internet and private links.\r\nNSXSD-WAN combines the economics and flexibility of a hybrid WAN with the deployment speed and low maintenance of a cloud-based service. It includes policy-based network-wide application performance, visibility and control while dramatically simplifying the WAN by delivering virtualized services from the cloud to branch offices.\r\nThe VMware NSX SD-WAN Edge by VeloCloud appliance is a compact, thin edge device that is zero-touch provisioned from the cloud for secure,optimized connectivity to applications and data. The NSX SD-WANEdge is also available as a VNF (virtual network function) for instantiation on a virtual CPE platform. The NSX SD-WAN Edge with Dynamic Multi-Path Optimization (DMPO) and deep application recognition aggregates multiple links (e.g. Private, Cable, DSL, 4G-LTE) and steers traffic over the optimal links to other on-premises NSX SD-WAN Edges in branch offices, private data centers, campuses, and headquarters. The NSX SD-WAN Edge can also optionally connect to the system of global VMware NSX SD-WAN Gateway by VeloCloud to provide performance, security,and visibility for cloud services (SaaS, IaaS, B2B Internet).\r\nThis system of NSX SD-WAN Gateways is deployed globally at top-tier cloud data centers to provide scalable and on-demand cloud network services. NSX SD-WAN Gateways implement NSX SD-WAN DMPO, cloud VPN and NSX SD-WAN Multisource Inbound Quality of Service between global cloud services (SaaS, IaaS, network services) and each NSX SD-WAN Edge, enabling multiple broadband and private leased lines to appear as a single, high-performance WAN. The cloud-based VMware NSX SD-WAN Orchestrator by VeloCloud is used to provision network-wide business policy, enable services insertion, perform real-time monitoring,and analyze application performance.\r\n<span style=\"font-weight: bold;\">Deploy in Minutes</span>\r\nUsing NSX SD-WAN’s zero-touch deployment capability, NSX SD-WAN can be quickly installed. The NSX SD-WAN Edge is shipped to the branch office where a non-technical person simply plugs in power and a few cables. Activation, configuration, and ongoing management are all handled in the cloud.\r\nEnterprise-wide Business Policies NSX SD-WAN makes setting policy as simple as a single click. Enterprises or their managed service providers can define business level policies that apply enterprise wide across many Edges, all througha centralized, cloud based NSX SD-WAN Orchestrator. Link steering, link remediation and QoS are all applied automatically based on the business policies; however specific configuration overrides may also be applied. The centralized NSX SD-WAN Orchestratoralso provides an enterprise wide view and configurability of routing in an overlay flow control table, eliminating complex node by node route configurations.\r\n<span style=\"font-weight: bold;\">SDN for the WAN</span>\r\nNSX SD-WAN brings SDN concepts to the enterprise branch WAN. Business policies implemented across the logical overlay deliver abstraction of application flows from the underlying physical transport. Agility is achieved based on adjusting forwarding to meet policy as well as real-time link conditions. NSX SD-WAN has a distributed control plane for forwarding decisions to be made locally with context, so there are no latency issues nor points of failure across the WAN. Yet each NSX SD-WAN node receives centralized control policies for easy programmability and enterprise wide visibility.\r\nA software based approach enables the flexibility and portability of deploying virtual NSX SD-WAN Edges on off-the-shelf x86 based hardware or as virtual network functions (VNFs) on virtual CPEs. Management is configurable via both a GUI and a Rest API.\r\n<span style=\"font-weight: bold;\">Solution Benefits</span>\r\nThe WAN is in transition as enterprises seek to improve agility and economics, and adapt to the shift of applications to the cloud. NSX SD-WAN offers enterprise-grade performance, security, visibility, and control over both public Internet and private networks.NSX SD-WAN dramatically simplifies the WAN with zero touch deployment, one-click business policy and services insertion, and cloud-based network as a service.","shortDescription":"NSX SD-WAN increases agility and cost effectiveness, while assuring application performance across the WAN.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"NSX SD-WAN by VeloCloud","keywords":"","description":"VMware NSX SD-WAN by VeloCloud enables enterprises to support application growth, network agility and simplified branch implementations while delivering optimized access to cloud services, private data centers and enterprise applications simultaneously over bo","og:title":"NSX SD-WAN by VeloCloud","og:description":"VMware NSX SD-WAN by VeloCloud enables enterprises to support application growth, network agility and simplified branch implementations while delivering optimized access to cloud services, private data centers and enterprise applications simultaneously over bo","og:image":"https://old.roi4cio.com/fileadmin/user_upload/VMware_NSX_SD-WAN.png"},"eventUrl":"","translationId":3315,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":93,"title":"Software-Defined WAN (SD-WAN)"}],"testingArea":"","categories":[{"id":499,"title":"SDN Software-Defined Network","alias":"sdn-software-defined-network","description":" <span style=\"font-weight: bold; \">Software-defined networking (SDN)</span> technology is an approach to network management that enables dynamic, programmatically efficient network configuration in order to improve network performance and monitoring, making it more like cloud computing than traditional network management.\r\nSDN encompasses several types of technologies, including functional separation, network virtualization and automation through programmability. SDN solution is meant to address the fact that the static architecture of traditional networks is decentralized and complex while current networks require more flexibility and easy troubleshooting. \r\nSDN technology attempts to centralize network intelligence in one network component by disassociating the forwarding process of network packets (<span style=\"font-weight: bold; \">data plane</span>) from the routing process (<span style=\"font-weight: bold; \">control plane</span>). The control plane consists of one or more controllers which are considered as the brain of SDN network where the whole intelligence is incorporated. Originally, software defined technology focused solely on separation of the network control plane from the data plane. While the control plane makes decisions about how packets should flow through the network, the data plane actually moves packets from place to place. \r\nIn a classic SDN scenario, a packet arrives at a network switch, and rules built into the switch's proprietary firmware tell the switch where to forward the packet. These packet-handling rules are sent to the switch from the centralized controller. The switch - also known as a <span style=\"font-weight: bold; \">data plane device</span> - queries the controller for guidance as needed, and it provides the controller with information about traffic it handles. The switch sends every packet going to the same destination along the same path and treats all the packets the exact same way.\r\nSoftware defined networking solutions use an operation mode that is sometimes called adaptive or dynamic, in which a switch issues a route request to a controller for a packet that does not have a specific route. This process is separate from adaptive routing, which issues route requests through routers and algorithms based on the network topology, not through a controller.\r\nThe <span style=\"font-weight: bold;\">virtualization</span> aspect of SDN comes into play through a virtual overlay, which is a logically separate network on top of the physical network. Users can implement end-to-end overlays to abstract the underlying network and segment network traffic. This microsegmentation is especially useful for service providers and operators with multi-tenant cloud environments and cloud services, as they can provision a separate virtual network with specific policies for each tenant.","materialsDescription":"<h1 class=\"align-center\">Benefits of Software Defined Networking</h1>\r\nWith SDN software, an <span style=\"font-weight: bold; \">administrator can change any network switch's rules when necessary</span> - prioritizing, deprioritizing or even blocking specific types of packets with a granular level of control and security. This is especially helpful in a cloud computing multi-tenant architecture, because it enables the administrator to manage traffic loads in a flexible and more efficient manner. Essentially, this enables the administrator to use less expensive commodity switches and have more control over network traffic flow than ever before.\r\nOther benefits of SDN are <span style=\"font-weight: bold; \">network management</span> and <span style=\"font-weight: bold; \">end-to-end visibility.</span>A network administrator need only deal with one centralized controller to distribute policies to the connected switches, instead of configuring multiple individual devices. This capability is also a security advantage because the controller can monitor traffic and deploy security policies. If the controller deems traffic suspicious, for example, it can reroute or drop the packets.\r\nSoftware defined networking software also <span style=\"font-weight: bold; \">virtualizes hardware</span> and <span style=\"font-weight: bold; \">services </span>that were previously carried out by dedicated hardware, resulting in the touted benefits of a reduced hardware footprint and lower operational costs.\r\nAdditionally, SDN contributed to the emergence of <span style=\"font-weight: bold; \">software-defined wide area network (SD-WAN)</span> technology. SD-WAN employs the virtual overlay aspect of SDN technology, abstracting an organization's connectivity links throughout its WAN and creating a virtual network that can use whichever connection the controller deems fit to send traffic.\r\n<h1 class=\"align-center\">Are there any SDN security benefits?</h1>\r\nAs security issues become more complex at the edge of the network, it’s no wonder that network and security professionals are looking for new ways to approach network protection. Nowadays, it seems like SDN is going to be the answer. \r\n<ul><li><span style=\"font-weight: bold; \">Centralized Network Control </span></li></ul>\r\nIn a traditional network, devices (router/switches) make their own decisions locally about where and how best to send traffic. In terms of network security, SDN can be used to route data packets through a single firewall and make IDS and IPS data capture more efficient.\r\n<ul><li><span style=\"font-weight: bold; \">Simplify Configuration</span></li></ul>\r\nThe SDN makes it easier to automate configuration and improves the traceability of those configurations. The introduction of SDN network management allows dynamic programming and restructuring of network settings, which reduces the risk of DDoS attacks. It is also worth adding that SDN has automatic quarantine capabilities. \r\n<ul><li><span style=\"font-weight: bold; \">Creation of High-level Network Policies</span></li></ul>\r\n<span style=\"color: rgb(97, 97, 97); \">Rather than physically configuring security solutions, SDN facilitates the central management of security policies to make network operator roles more efficient and flexible. Moreover, SDN helps to move away from current management approaches such as SNMP/CLI and build more effective policy management. </span>\r\n<ul><li><span style=\"font-weight: bold; \"><span style=\"color: rgb(97, 97, 97); \">Easy to use Application Programming Interfaces (APIs)</span></span></li></ul>\r\n<span style=\"color: rgb(97, 97, 97); \">Cloud APIs are interfaces presented by software and play a vital role in SDN controllers and applications. Easy to use APIs help to manage network resources, improve the efficiency of IT resources, and aid integration with IT tools. Additionally, a number of good cloud security practices have been introduced recently. </span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_SDN_Software_Defined_Network.png"},{"id":52,"title":"SaaS - software as a service","alias":"saas-software-as-a-service","description":"<span style=\"font-weight: bold;\">Software as a service (SaaS)</span> is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is sometimes referred to as "on-demand software", and was formerly referred to as "software plus services" by Microsoft.\r\n SaaS services is typically accessed by users using a thin client, e.g. via a web browser. SaaS software solutions has become a common delivery model for many business applications, including office software, messaging software, payroll processing software, DBMS software, management software, CAD software, development software, gamification, virtualization, accounting, collaboration, customer relationship management (CRM), Management Information Systems (MIS), enterprise resource planning (ERP), invoicing, human resource management (HRM), talent acquisition, learning management systems, content management (CM), Geographic Information Systems (GIS), and service desk management. SaaS has been incorporated into the strategy of nearly all leading enterprise software companies.\r\nSaaS applications are also known as <span style=\"font-weight: bold;\">Web-based software</span>, <span style=\"font-weight: bold;\">on-demand software</span> and<span style=\"font-weight: bold;\"> hosted software</span>.\r\nThe term "Software as a Service" (SaaS) is considered to be part of the nomenclature of cloud computing, along with Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Desktop as a Service (DaaS),managed software as a service (MSaaS), mobile backend as a service (MBaaS), and information technology management as a service (ITMaaS).\r\nBecause SaaS is based on cloud computing it saves organizations from installing and running applications on their own systems. That eliminates or at least reduces the associated costs of hardware purchases and maintenance and of software and support. The initial setup cost for a SaaS application is also generally lower than it for equivalent enterprise software purchased via a site license.\r\nSometimes, the use of SaaS cloud software can also reduce the long-term costs of software licensing, though that depends on the pricing model for the individual SaaS offering and the enterprise’s usage patterns. In fact, it’s possible for SaaS to cost more than traditional software licenses. This is an area IT organizations should explore carefully.<br />SaaS also provides enterprises the flexibility inherent with cloud services: they can subscribe to a SaaS offering as needed rather than having to buy software licenses and install the software on a variety of computers. The savings can be substantial in the case of applications that require new hardware purchases to support the software.<br /><br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Who uses SaaS?</span></h1>\r\nIndustry analyst Forrester Research notes that SaaS adoption has so far been concentrated mostly in human resource management (HRM), customer relationship management (CRM), collaboration software (e.g., email), and procurement solutions, but is poised to widen. Today it’s possible to have a data warehouse in the cloud that you can access with business intelligence software running as a service and connect to your cloud-based ERP like NetSuite or Microsoft Dynamics.The dollar savings can run into the millions. And SaaS installations are often installed and working in a fraction of the time of on-premises deployments—some can be ready in hours. \r\nSales and marketing people are likely familiar with Salesforce.com, the leading SaaS CRM software, with millions of users across more than 100,000 customers. Sales is going SaaS too, with apps available to support sales in order management, compensation, quote production and configure, price, quoting, electronic signatures, contract management and more.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why SaaS? Benefits of software as a service</span></h1>\r\n<ul><li><span style=\"font-weight: bold;\">Lower cost of entry</span>. With SaaS solution, you pay for what you need, without having to buy hardware to host your new applications. Instead of provisioning internal resources to install the software, the vendor provides APIs and performs much of the work to get their software working for you. The time to a working solution can drop from months in the traditional model to weeks, days or hours with the SaaS model. In some businesses, IT wants nothing to do with installing and running a sales app. In the case of funding software and its implementation, this can be a make-or-break issue for the sales and marketing budget, so the lower cost really makes the difference.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reduced time to benefit/rapid prototyping</span>. In the SaaS model, the software application is already installed and configured. Users can provision the server for the cloud and quickly have the application ready for use. This cuts the time to benefit and allows for rapid demonstrations and prototyping. With many SaaS companies offering free trials, this means a painless proof of concept and discovery phase to prove the benefit to the organization. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Pay as you go</span>. SaaS business software gives you the benefit of predictable costs both for the subscription and to some extent, the administration. Even as you scale, you can have a clear idea of what your costs will be. This allows for much more accurate budgeting, especially as compared to the costs of internal IT to manage upgrades and address issues for an owned instance.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">The SaaS vendor is responsible for upgrades, uptime and security</span>. Under the SaaS model, since the software is hosted by the vendor, they take on the responsibility for maintaining the software and upgrading it, ensuring that it is reliable and meeting agreed-upon service level agreements, and keeping the application and its data secure. While some IT people worry about Software as a Service security outside of the enterprise walls, the likely truth is that the vendor has a much higher level of security than the enterprise itself would provide. Many will have redundant instances in very secure data centers in multiple geographies. Also, the data is being automatically backed up by the vendor, providing additional security and peace of mind. Because of the data center hosting, you’re getting the added benefit of at least some disaster recovery. Lastly, the vendor manages these issues as part of their core competencies—let them.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Integration and scalability.</span> Most SaaS apps are designed to support some amount of customization for the way you do business. SaaS vendors create APIs to allow connections not only to internal applications like ERPs or CRMs but also to other SaaS providers. One of the terrific aspects of integration is that orders written in the field can be automatically sent to the ERP. Now a salesperson in the field can check inventory through the catalog, write the order in front of the customer for approval, send it and receive confirmation, all in minutes. And as you scale with a SaaS vendor, there’s no need to invest in server capacity and software licenses. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Work anywhere</span>. Since the software is hosted in the cloud and accessible over the internet, users can access it via mobile devices wherever they are connected. This includes checking customer order histories prior to a sales call, as well as having access to real time data and real time order taking with the customer.</li></ul>\r\n<p class=\"align-left\"> </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/SaaS__1_.png"},{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"<span style=\"font-weight: bold; \">IT service management (ITSM)</span> is the process of designing, delivering, managing, and improving the IT services an organization provides to its end users. ITSM is focused on aligning IT processes and services with business objectives to help an organization grow.\r\nITSM positions IT services as the key means of delivering and obtaining value, where an internal or external IT service provider works with business customers, at the same time taking responsibility for the associated costs and risks. ITSM works across the whole lifecycle of a service, from the original strategy, through design, transition and into live operation.\r\nTo ensure sustainable quality of IT services, ITSM establishes a set of practices, or processes, constituting a service management system. There are industrial, national and international standards for IT service management solutions, setting up requirements and good practices for the management system. \r\nITSM system is based on a set of principles, such as focusing on value and continual improvement. It is not just a set of processes – it is a cultural mindset to ensure that the desired outcome for the business is achieved. \r\n<span style=\"font-weight: bold; \">ITIL (IT Infrastructure Library)</span> is a framework of best practices and recommendations for managing an organization's IT operations and services. IT service management processes, when built based on the ITIL framework, pave the way for better IT service operations management and improved business. To summarize, ITIL is a set of guidelines for effective IT service management best practices. ITIL has evolved beyond the delivery of services to providing end-to-end value delivery. The focus is now on the co-creation of value through service relationships. \r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">ITSM processes typically include five stages, all based on the ITIL framework:</span></p>\r\n<span style=\"font-weight: bold; \">ITSM strategy.</span> This stage forms the foundation or the framework of an organization's ITSM process building. It involves defining the services that the organization will offer, strategically planning processes, and recognizing and developing the required assets to keep processes moving. \r\n<span style=\"font-weight: bold; \">Service design.</span> This stage's main aim is planning and designing the IT services the organization offers to meet business demands. It involves creating and designing new services as well as assessing current services and making relevant improvements.\r\n<span style=\"font-weight: bold; \">Service transition.</span> Once the designs for IT services and their processes have been finalized, it's important to build them and test them out to ensure that processes flow. IT teams need to ensure that the designs don't disrupt services in any way, especially when existing IT service processes are upgraded or redesigned. This calls for change management, evaluation, and risk management. \r\n<span style=\"font-weight: bold; \">Service operation. </span>This phase involves implementing the tried and tested new or modified designs in a live environment. While in this stage, the processes have already been tested and the issues fixed, but new processes are bound to have hiccups—especially when customers start using the services. \r\n<span style=\"font-weight: bold;\">Continual service improvement (CSI).</span> Implementing IT processes successfully shouldn't be the final stage in any organization. There's always room for improvement and new development based on issues that pop up, customer needs and demands, and user feedback.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Benefits of efficient ITSM processes</h1>\r\nIrrespective of the size of business, every organization is involved in IT service management in some way. ITSM ensures that incidents, service requests, problems, changes, and IT assets—in addition to other aspects of IT services—are managed in a streamlined way.\r\nIT teams in your organization can employ various workflows and best practices in ITSM, as outlined in ITIL. Effective IT service management can have positive effects on an IT organization's overall function.\r\nHere are the 10 key benefits of ITSM:\r\n<ul><li> Lower costs for IT operations</li><li> Higher returns on IT investments</li><li> Minimal service outages</li><li> Ability to establish well-defined, repeatable, and manageable IT processes</li><li> Efficient analysis of IT problems to reduce repeat incidents</li><li> Improved efficiency of IT help desk teams</li><li> Well-defined roles and responsibilities</li><li> Clear expectations on service levels and service availability</li><li> Risk-free implementation of IT changes</li><li> Better transparency into IT processes and services</li></ul>\r\n<h1 class=\"align-center\">How to choose an ITSM tool?</h1>\r\nWith a competent IT service management goal in mind, it's important to invest in a service desk solution that caters to your business needs. It goes without saying, with more than 150 service desk tools to choose from, selecting the right one is easier said than done. Here are a few things to keep in mind when choosing an ITSM products:\r\n<span style=\"font-weight: bold; \">Identify key processes and their dependencies. </span>Based on business goals, decide which key ITSM processes need to be implemented and chart out the integrations that need to be established to achieve those goals. \r\n<span style=\"font-weight: bold; \">Consult with ITSM experts.</span> Participate in business expos, webinars, demos, etc., and educate yourself about the various options that are available in the market. Reports from expert analysts such as Gartner and Forrester are particularly useful as they include reviews of almost every solution, ranked based on multiple criteria.\r\n<span style=\"font-weight: bold; \">Choose a deployment option.</span> Every business has a different IT infrastructure model. Selecting an on-premises or software as a service (SaaS IT service management) tool depends on whether your business prefers to host its applications and data on its own servers or use a public or private cloud.\r\n<span style=\"font-weight: bold; \">Plan ahead for the future.</span> Although it's important to consider the "needs" primarily, you shouldn't rule out the secondary or luxury capabilities. If the ITSM tool doesn't have the potential to adapt to your needs as your organization grows, it can pull you back from progressing. Draw a clear picture of where your business is headed and choose an service ITSM that is flexible and technology-driven.\r\n<span style=\"font-weight: bold;\">Don't stop with the capabilities of the ITSM tool.</span> It might be tempting to assess an ITSM tool based on its capabilities and features but it's important to evaluate the vendor of the tool. A good IT support team, and a vendor that is endorsed for their customer-vendor relationship can take your IT services far. Check Gartner's magic quadrant and other analyst reports, along with product and support reviews to ensure that the said tool provides good customer support.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_ITSM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"poweredge-rack-server":{"id":68,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/PowerEdge_Rack_Server.jpg","logo":true,"scheme":false,"title":"PowerEdge Rack Server","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":15,"alias":"poweredge-rack-server","companyTitle":"DELL","companyTypes":["vendor"],"companyId":169,"companyAlias":"dell","description":"Dell PowerEdge Rack Servers maximize productivity while offering industry leading performance and efficiency in a rack form factor.\r\nOutstanding performance and efficiency for the major databases, virtualization and Virtual Desktop Infrastructure.\r\nThree server level: Entry, advanced and premium.","shortDescription":"Dell PowerEdge Rack Servers maximize productivity while offering industry leading performance and efficiency in a rack form factor.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"PowerEdge Rack Server","keywords":"efficiency, performance, PowerEdge, Rack, virtualization, databases, major, Desktop","description":"Dell PowerEdge Rack Servers maximize productivity while offering industry leading performance and efficiency in a rack form factor.\r\nOutstanding performance and efficiency for the major databases, virtualization and Virtual Desktop Infrastructure.\r\nThree serve","og:title":"PowerEdge Rack Server","og:description":"Dell PowerEdge Rack Servers maximize productivity while offering industry leading performance and efficiency in a rack form factor.\r\nOutstanding performance and efficiency for the major databases, virtualization and Virtual Desktop Infrastructure.\r\nThree serve","og:image":"https://old.roi4cio.com/fileadmin/user_upload/PowerEdge_Rack_Server.jpg"},"eventUrl":"","translationId":95,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":435,"title":"Rack Server","alias":"rack-server","description":"A rack mount server is a great way to maximize your shelf space by packing a lot of servers into a small space. Rackmount servers are typically easier for administrators to manage due to proximity, modularity and better cable management. Lockable rack cabinet doors and steel server front panels provide an additional level of physical security. Additionally, rack unit designed servers are better able to keep the server components cool than traditional tower form factor. Industry standard 19-inch racks will allow you to easily expand your business without taking up more valuable floor space.\r\nThere is a lot of thought that needs to go into which size rack server is best bet for your project. Both current requirements and future expansion plans need to be taken into account to ensure your server remains capable in the future.\r\nBoth large and small projects can be built on the 1U server platform. "U" stands for unit, “unit”, and this means thickness: server rack 1U = 1.75 inches or 44 mm wide. A reasonable amount of storage can fit within a 1U, processing power has no limits, and some models even allow up to two PCI-Express cards. Modern computer hardware uses much less power than it ever has in the past, which means less heat generation. Some 1U servers to still produce some acoustic noise, but is nowhere near the level of needing earmuffs like the old days. The only reason to go up in size is for additional expansion options.\r\n2U models allow for multiple "low-profile" PCI-Express cards while keeping a compact form factor and also providing some additional storage space. If the plan is to use multiple full height cards, then 3U or 4U servers should be the focus. The 4U models are very popular and offer flexible options. The 3U models do have limitations on expansion card compatibility and are really only for situations where rack space needs to be absolutely optimized (14x3U servers or 10x4U servers can fit in a 42u rack).","materialsDescription":"<span style=\"font-weight: bold;\">What is a ‘rack unit’?</span>\r\nA rack unit is the designated unit of measurement used when describing or quantifying the vertical space you have available in any equipment rack. One unit is equal to 1.75 inches, or 4.45 centimeters. Any equipment that has the ability to be mounted onto a rack is generally designed in a standard size to fit into many different server rack heights. It’s actually been standardized by the Electronic Industries Alliance (EIA). The most common heights are between 8U to 50U, but customization is also a viable option if you’re working with nonstandard sizes.\r\n<span style=\"font-weight: bold;\">Are there any specific ventilation requirements with server racks?</span>\r\nOver 65% of IT equipment failures are directly attributed to inadequate, poorly maintained, or failed air conditioning in the server room. So yes, proper ventilation is a critical part of maintaining any data center. Some cabinet manufacturers construct side panel ventilation instead of front and back ventilation, but experts say it’s inadequate for rack mount servers. This can be especially dangerous if more than one cabinet is being set up at once. The importance of proper ventilation should not be taken lightly, and you should always opt for front to back ventilation except in network applications where the IT equipment exhausts out the side.\r\n<span style=\"font-weight: bold;\">What is meant by ‘server rack depth’?</span>\r\nServer rack depth is a critical aspect of the ventilation process. Connectworld.net says, “Server cabinet depth is important not only because it has to allow room for the depth of the particular equipment to be rack-mounted (deep servers vs. routers or switches), but also it has to allow sufficient room for cables, PDU’s as well as airflow.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Rack_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"v5-systems-onsound-acoustic-gunshot-detection":{"id":5033,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/V5_Systems.png","logo":true,"scheme":false,"title":"V5 Systems OnSound Acoustic Gunshot Detection","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"v5-systems-onsound-acoustic-gunshot-detection","companyTitle":"V5 Systems","companyTypes":["supplier","vendor"],"companyId":5421,"companyAlias":"v5-systems","description":"The <span style=\"font-weight: bold;\">OnSound Acoustic Gunshot Detection solution</span> gets you on the scene faster. Become proactive with reliable, validated information that’s transferred to end-users in real-time.\r\n<span style=\"font-weight: bold;\">The OnSound Acoustic Gunshot Detection enables:</span>\r\n<ul><li><span style=\"font-weight: bold;\">Validated and accurate gunshot alert(s) relayed in seconds</span> directly to end-users when our AI software coupled with edge computing detects and classifies a gunshot</li><li>Monitoring, viewing and downloading of an alert through <span style=\"font-weight: bold;\">V5 Systems Multi-Sensor Management System</span></li><li>Our AI technology will continue to learn its environment over time <span style=\"font-weight: bold;\">enhancing accuracy and reducing false positives</span></li></ul>\r\n<span style=\"font-weight: bold;\">V5 GUNSHOT DETECTION SENSOR SOFTWARE HIGHLIGHTS</span>\r\n<ul><li><span style=\"font-weight: bold;\">Artificial Intelligence:</span> Ability to learn the ambient sounds of its environment to increase accuracy/decrease false positives over time</li><li><span style=\"font-weight: bold;\">Customizable Sensitivity:</span> Adjust the sensitivity level to detect fainter, more distant shots in quieter environments, or ignore louder noises in noisy environments</li><li><span style=\"font-weight: bold;\">Alert Filtering:</span> Customize the alerting confidence, allowing only potential shots above a certain confidence threshold to generate an alert</li><li><span style=\"font-weight: bold;\">Directional Masking:</span> Configure the system to ignore shots from certain directions or elevations</li><li><span style=\"font-weight: bold;\">V5 MMS (Multi-sensor Management System):</span> Ability to send real-time alerts directly to the customer to take immediate action. V5 MMS is available through the web, Android and iPhone app.</li><li><span style=\"font-weight: bold;\">Acoustic Tracking System:</span> Ability to learn other types of sounds in addition to gunshots without requiring new hardware</li></ul>\r\n<span style=\"font-weight: bold;\">V5 GUNSHOT DETECTION SENSOR HARDWARE HIGHLIGHTS</span>\r\n<ul><li><span style=\"font-weight: bold;\">Low Power Architecture:</span> V5 Systems’ devices contain Advanced RISC Processors that run proprietary V5 Systems software that is optimized to reduce CPU, Memory and Power consumption. This can also be executed on standard Intel 64 bit servers. This is not the same for other vendors who only use 64 Bit CPUs.</li><li><span style=\"font-weight: bold;\">Multi-Sensor Capable:</span> V5 Systems’ platform is designed for integration with all types of low-powered sensors. This allows V5 System’s portable devices to See, Hear and Smell, as well as other sensing capabilities.</li><li><span style=\"font-weight: bold;\">Power Management System:</span> V5 Systems’ portable devices are powered through a combination of bullet-resistant solar, V5 Systems battery banks and a proprietary power management system. This allows infrastructure-free deployments requiring no trenching, permits, wired power or wired communications.</li><li><span style=\"font-weight: bold;\">Bullet-resistant Solar Panels:</span> all V5 Systems’ devices come with bullet-resistant solar panels that are 80% lighter than standard solar panels without the need for a glass face and metal frame.</li><li><span style=\"font-weight: bold;\">GPS Tracked:</span> all V5 Systems’ devices are embedded with GPS antennas.</li></ul>","shortDescription":"When a gunshot goes off, get alerted in real-time with an innovative, self-powered solution.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"V5 Systems OnSound Acoustic Gunshot Detection","keywords":"","description":"The <span style=\"font-weight: bold;\">OnSound Acoustic Gunshot Detection solution</span> gets you on the scene faster. Become proactive with reliable, validated information that’s transferred to end-users in real-time.\r\n<span style=\"font-weight: bold;\">The OnSo","og:title":"V5 Systems OnSound Acoustic Gunshot Detection","og:description":"The <span style=\"font-weight: bold;\">OnSound Acoustic Gunshot Detection solution</span> gets you on the scene faster. Become proactive with reliable, validated information that’s transferred to end-users in real-time.\r\n<span style=\"font-weight: bold;\">The OnSo","og:image":"https://old.roi4cio.com/fileadmin/user_upload/V5_Systems.png"},"eventUrl":"","translationId":5034,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":834,"title":"IoT - Internet of Things Security","alias":"iot-internet-of-things-security","description":" IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).\r\nIoT involves adding internet connectivity to a system of interrelated computing devices, mechanical and digital machines, objects, animals and/or people. Each "thing" is provided a unique identifier and the ability to automatically transfer data over a network. Allowing devices to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected.\r\nIoT security has become the subject of scrutiny after a number of high-profile incidents where a common IoT device was used to infiltrate and attack the larger network. Implementing security measures is critical to ensuring the safety of networks with IoT devices connected to them.\r\nIoT security hacks can happen in any industry, from smart home to a manufacturing plant to a connected car. The severity of impact depends greatly on the individual system, the data collected and/or the information it contains.\r\nAn attack disabling the brakes of a connected car, for example, or on a connected health device, such as an insulin pump hacked to administer too much medication to a patient, can be life-threatening. Likewise, an attack on a refrigeration system housing medicine that is monitored by an IoT system can ruin the viability of a medicine if temperatures fluctuate. Similarly, an attack on critical infrastructure -- an oil well, energy grid or water supply -- can be disastrous.\r\nSo, a robust IoT security portfolio must allow protecting devices from all types of vulnerabilities while deploying the security level that best matches application needs. Cryptography technologies are used to combat communication attacks. Security services are offered for protecting against lifecycle attacks. Isolation measures can be implemented to fend off software attacks. And, finally, IoT security should include tamper mitigation and side-channel attack mitigation technologies for fighting physical attacks of the chip.","materialsDescription":" <span style=\"font-weight: bold;\">What are the key requirements of IoT Security?</span>\r\nThe key requirements for any IoT security solution are:\r\n<ul><li>Device and data security, including authentication of devices and confidentiality and integrity of data</li><li>Implementing and running security operations at IoT scale</li><li>Meeting compliance requirements and requests</li><li>Meeting performance requirements as per the use case</li></ul>\r\n<span style=\"font-weight: bold;\">What do connected devices require to participate in the IoT Securely?</span>\r\nTo securely participate in the IoT, each connected device needs a unique identification – even before it has an IP address. This digital credential establishes the root of trust for the device’s entire lifecycle, from initial design to deployment to retirement.\r\n<span style=\"font-weight: bold;\">Why is device authentication necessary for the IoT?</span>\r\nStrong IoT device authentication is required to ensure connected devices on the IoT can be trusted to be what they purport to be. Consequently, each IoT device needs a unique identity that can be authenticated when the device attempts to connect to a gateway or central server. With this unique ID in place, IT system administrators can track each device throughout its lifecycle, communicate securely with it, and prevent it from executing harmful processes. If a device exhibits unexpected behavior, administrators can simply revoke its privileges.\r\n<span style=\"font-weight: bold;\">Why is secure manufacturing necessary for IoT devices?</span>\r\nIoT devices produced through unsecured manufacturing processes provide criminals opportunities to change production runs to introduce unauthorized code or produce additional units that are subsequently sold on the black market.\r\nOne way to secure manufacturing processes is to use hardware security modules (HSMs) and supporting security software to inject cryptographic keys and digital certificates and to control the number of units built and the code incorporated into each.\r\n<span style=\"font-weight: bold;\">Why is code signing necessary for IoT devices?</span>\r\nTo protect businesses, brands, partners, and users from software that has been infected by malware, software developers have adopted code signing. In the IoT, code signing in the software release process ensures the integrity of IoT device software and firmware updates and defends against the risks associated with code tampering or code that deviates from organizational policies.\r\nIn public key cryptography, code signing is a specific use of certificate-based digital signatures that enables an organization to verify the identity of the software publisher and certify the software has not been changed since it was published.\r\n<span style=\"font-weight: bold;\">What is IoT PKI?</span>\r\nToday there are more things (devices) online than there are people on the planet! Devices are the number one users of the Internet and need digital identities for secure operation. As enterprises seek to transform their business models to stay competitive, rapid adoption of IoT technologies is creating increasing demand for Public Key Infrastructures (PKIs) to provide digital certificates for the growing number of devices and the software and firmware they run.\r\nSafe IoT deployments require not only trusting the devices to be authentic and to be who they say they are, but also trusting that the data they collect is real and not altered. If one cannot trust the IoT devices and the data, there is no point in collecting, running analytics, and executing decisions based on the information collected.\r\nSecure adoption of IoT requires:\r\n<ul><li>Enabling mutual authentication between connected devices and applications</li><li>Maintaining the integrity and confidentiality of the data collected by devices</li><li>Ensuring the legitimacy and integrity of the software downloaded to devices</li><li>Preserving the privacy of sensitive data in light of stricter security regulations</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/iot.png"},{"id":178,"title":"IoT - Internet of Things","alias":"iot-internet-of-things","description":"The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects. Embedded with electronics, Internet connectivity, and other forms of hardware (such as sensors), these devices can communicate and interact with others over the Internet, and they can be remotely monitored and controlled.\r\nThe definition of the Internet of things has evolved due to the convergence of multiple technologies, real-time analytics, machine learning, commodity sensors, and embedded systems. Traditional fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation). and others all contribute to enabling the Internet of things. In the consumer market, IoT technology is most synonymous with products pertaining to the concept of the "smart home", covering devices and appliances (such as lighting fixtures, thermostats, home security systems and cameras, and other home appliances) that support one or more common ecosystems, and can be controlled via devices associated with that ecosystem, such as smartphones and smart speakers.\r\nThe IoT concept has faced prominent criticism, especially in regards to privacy and security concerns related to these devices and their intention of pervasive presence.","materialsDescription":"<span style=\"font-weight: bold;\">What is the Internet of Things (IoT)?</span>\r\nThe Internet of things refers to the network of things (physical objects) that can be connected to the Internet to collect and share data without human-to-human or human-to-computer interaction.\r\n<span style=\"font-weight: bold;\">Why is it called the Internet of Things?</span>\r\nThe term Internet of things was coined by Kevin Ashton in 1999. Stemming from Kevin Ashton’s experience with RFID, the term Internet of things originally described the concept of tagging every object in a person’s life with machine-readable codes. This would allow computers to easily manage and inventory all of these things.\r\nThe term IoT today has evolved to a much broader prospect. It now encompasses ubiquitous connectivity, devices, sensors, analytics, machine learning, and many other technologies.\r\n<span style=\"font-weight: bold;\">What is an IoT solution?</span>\r\nAn IoT solution is a combination of devices or other data sources, outfitted with sensors and Internet connected hardware to securely report information back to an IoT platform. This information is often a physical metric which can help users answer a question or solve a specific problem.\r\n<span style=\"font-weight: bold;\">What is an IoT Proof of Concept (PoC)?</span>\r\nThe purpose of a PoC is to experiment with a solution in your environment, collect data, and evaluate performance from a set timeline on a set budget. A PoC is a low-risk way to introduce IoT to an organization.\r\n<span style=\"font-weight: bold;\">What is an IoT cloud platform?</span>\r\nAn IoT platform provides users with one or more of these key elements — visualization tools, data security features, a workflow engine and a custom user interface to utilize the information collected from devices and other data sources in the field. These platforms are based in the cloud and can be accessed from anywhere.\r\n<span style=\"font-weight: bold;\">What is industrial equipment monitoring?</span>\r\nIndustrial equipment monitoring uses a network of connected sensors - either native to a piece of equipment or retrofitted - to inform owners/operators of a machine’s output, component conditions, need for service or impending failure. Industrial equipment monitoring is an IoT solution which can utilize an IoT platform to unify disparate data and enable decision-makers to respond to real-time data.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/IoT_-_Internet_of_Things.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"vmware-airwatch-enterprise-mobility-management":{"id":134,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/VMware_AirWatch.png","logo":true,"scheme":false,"title":"VMWare AirWatch - Enterprise Mobility Management","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":97,"alias":"vmware-airwatch-enterprise-mobility-management","companyTitle":"VMware","companyTypes":["vendor"],"companyId":168,"companyAlias":"vmware","description":"\r\n<p>What AirWatch Does Manage All Endpoints in a Single Solution AirWatch is built to manage the entire lifecycle of any endpoint, across all major operating systems in a single management console. You have various use cases spread across your business. The advantage of managing mobility with AirWatch is the ability to uniquely support these use cases within a single solution, including full device management, app-level management for BYOD or line of business use cases such as kiosk or shared devices. Support Full App Lifecycle from Development to Deployment AirWatch supports the complete app lifecycle including sourcing or developing an app, applying security policies, deploying an app catalog and analyzing app metrics. You can seamlessly deploy any app – native, web or remote – through a single app catalog across every device with built-in single sign-on. If you’re looking to develop internal apps, AirWatch supports three approaches: AppConfig Community, VMware AirWatch Software Development Kit or app wrapping. Automate Processes and Deliver Intelligent Insights IT is consistently challenged to deliver more for the business without additional budget or resources. One of the key advantages of the AirWatch platform is our powerful automation engines that ease the strain on IT that is typically associated with initial device deployment and day-to-day mobility management.</p>\r\n","shortDescription":"VMware AirWatch is a comprehensive enterprise mobility platform that delivers simplified access to enterprise apps, secures corporate data and enables mobile productivity","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":true,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"VMWare AirWatch - Enterprise Mobility Management","keywords":"AirWatch, management, single, with, business, device, cases, across","description":"\r\n<p>What AirWatch Does Manage All Endpoints in a Single Solution AirWatch is built to manage the entire lifecycle of any endpoint, across all major operating systems in a single management console. You have various use cases spread across your business.","og:title":"VMWare AirWatch - Enterprise Mobility Management","og:description":"\r\n<p>What AirWatch Does Manage All Endpoints in a Single Solution AirWatch is built to manage the entire lifecycle of any endpoint, across all major operating systems in a single management console. You have various use cases spread across your business.","og:image":"https://old.roi4cio.com/fileadmin/user_upload/VMware_AirWatch.png"},"eventUrl":"","translationId":134,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":89,"title":"MDM - Mobile Device Management"}],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"vmware-carbon-black-app-control":{"id":6140,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/VMW-CB-default-featured-01.png","logo":true,"scheme":false,"title":"VMware Carbon Black App Control","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":97,"alias":"vmware-carbon-black-app-control","companyTitle":"VMware","companyTypes":["vendor"],"companyId":168,"companyAlias":"vmware","description":"Highly targeted assets demand perfect security, but can’t afford loss in performance. Critical systems are increasingly targeted because they contain the most valuable information. These systems cannot afford a moment of unscheduled downtime or performance degradation as they are the lifeblood of the organization. They often run on out-of-date or unsupported operating systems, which are costly to secure and support. The most common approach to defending these systems typically relies on layering multiple, ineffective security products, which is costly, creates risk and jeopardizes performance.\r\nVMware Carbon Black App Control is an industry-leading application control product, used to lock down servers and critical systems, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Leveraging cloud reputation services, IT-based trust policies and multiple sources of threat intelligence from the VMware Carbon Black Cloud, VMware Carbon Black App Control ensures that only trusted and approved software is allowed to execute on an organization’s critical systems and endpoints.\r\nVMware Carbon Black App Control combines application whitelisting, file integrity monitoring, full-featured device control and memory/tamper protection into a single agent. VMware Carbon Black App Control watches for behavioral indicators of malicious activity and conducts continuous recording of attack details to provide rich visibility into everything suspicious that attackers attempt to do. With the addition of the File Delete feature, VMware Carbon Black App Control is now a direct control for requirement 5 of PCI DSS, enabling customers to remove traditional antivirus without the need for undergoing the compensating control process.\r\nSecurity teams can harden their new and legacy systems against all unwanted change, simplify the compliance process, and provide the best possible protection for corporate systems at enterprise scale. VMware Carbon Black App Control is available through MSSPs or directly through on-premise.<br /><br /><span style=\"font-weight: bold;\">KEY CAPABILITIES</span>\r\nVMware Carbon Black App Control is a powerful positive security solution for data centers and critical systems that allows server admins to control change while consolidating agents. Using a ‘Default Deny’ approach, VMware Carbon Black App Control reduces your attack surface and downtime by automating approval of trusted software and eliminating the burden of whitelist management.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Lock Down Critical Systems</span></span>\r\nStop malware and non-malware attacks by preventing unwanted changes to your applications and files, providing you with the control over your environment that you need.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Ensure Continuous Compliance</span></span>\r\nAccelerate compliance by meeting many of the requirements in regulatory standards and frameworks, such as PCI-DSS, HIPAA/HITECH, SOX, NERC CIP, GDPR and NIST 800-53.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">High Performance and Low Touch Application Control</span></span>\r\nBe confident that your solution is blocking the “bad” and allowing the “good” without interrupting daily operations.<br /><br /><span style=\"font-weight: bold;\">BENEFITS</span>\r\n<ul><li>Stop malware, ransomware and next-gen attacks</li></ul>\r\n<ul><li>Eliminate unplanned downtime of critical systems</li></ul>\r\n<ul><li>Consolidate endpoint agents</li></ul>\r\n<ul><li>Prevent unwanted change to system configuration</li></ul>\r\n<ul><li>Meet IT risk and audit controls across major regulatory mandates</li></ul>\r\n<ul><li>Increase efficiency of IT resources with streamlined IT audit processes</li></ul>\r\n<ul><li>Protect legacy systems running on unsupported operating systems</li></ul>\r\n<ul><li>App Control is now a direct control for requirement 5 of PCI DSS</li></ul>\r\n<br /><span style=\"font-weight: bold;\">FEATURES</span>\r\n<ul><li>Application control</li></ul>\r\n<ul><li>File integrity monitoring and control</li></ul>\r\n<ul><li>Device control</li></ul>\r\n<ul><li>Memory protection</li></ul>\r\n<ul><li>Reputation services</li></ul>\r\n<ul><li>Open APIs</li></ul>\r\n<br /><span style=\"font-weight: bold;\">PLATFORMS</span>\r\n<ul><li>Sensor Support:</li></ul>\r\n<ul><li>Windows XP, Server, Vista, Embedded, POS</li></ul>\r\n<ul><li>Mac OS X</li></ul>\r\n<ul><li>RHEL Linux</li></ul>\r\n<ul><li>CentOS Linux</li></ul>\r\n<ul><li>Oracle RHCK Linux</li></ul>","shortDescription":"VMware Carbon Black App Control is used to lock down servers and critical systems, prevent unwanted changes and ensure continuous compliance with regulatory mandates","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"VMware Carbon Black App Control","keywords":"","description":"Highly targeted assets demand perfect security, but can’t afford loss in performance. Critical systems are increasingly targeted because they contain the most valuable information. These systems cannot afford a moment of unscheduled downtime or performance deg","og:title":"VMware Carbon Black App Control","og:description":"Highly targeted assets demand perfect security, but can’t afford loss in performance. Critical systems are increasingly targeted because they contain the most valuable information. These systems cannot afford a moment of unscheduled downtime or performance deg","og:image":"https://old.roi4cio.com/fileadmin/user_upload/VMW-CB-default-featured-01.png"},"eventUrl":"","translationId":6141,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":481,"title":"WAF-web application firewall","alias":"waf-web-application-firewall","description":"A <span style=\"font-weight: bold; \">WAF (Web Application Firewall)</span> helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. It typically protects web applications from attacks such as cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection, among others. A WAF is a protocol layer 7 defense (in the OSI model), and is not designed to defend against all types of attacks. This method of attack mitigation is usually part of a suite of tools which together create a holistic defense against a range of attack vectors.\r\nIn recent years, web application security has become increasingly important, especially after web application attacks ranked as the most common reason for breaches, as reported in the Verizon Data Breach Investigations Report. WAFs have become a critical component of web application security, and guard against web application vulnerabilities while providing the ability to customize the security rules for each application. As WAF is inline with traffic, some functions are conveniently implemented by a load balancer.\r\nAccording to the PCI Security Standards Council, WAFs function as “a security policy enforcement point positioned between a web application and the client endpoint. This functionality can be implemented in software or hardware, running in an appliance device, or in a typical server running a common operating system. It may be a stand-alone device or integrated into other network components.”\r\nBy deploying a WAF firewall in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a web firewall is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server.\r\nA WAF operates through a set of rules often called <span style=\"font-weight: bold; \">policies.</span> These policies aim to protect against vulnerabilities in the application by filtering out malicious traffic. The value of a WAF management comes in part from the speed and ease with which policy modification can be implemented, allowing for faster response to varying attack vectors; during a DDoS attack, rate limiting can be quickly implemented by modifying WAF policies.\r\nWAF solutions can be deployed in several ways—it all depends on where your applications are deployed, the services needed, how you want to manage it, and the level of architectural flexibility and performance you require. Do you want to manage it yourself, or do you want to outsource that management? Is it a better model to have a cloud WAF service, option or do you want your WAF to sit on-premises?\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">A WAF products can be implemented one of three different ways:</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">A network-based WAF</span> is generally hardware-based. Since they are installed locally they minimize latency, but network-based WAFs are the most expensive option and also require the storage and maintenance of physical equipment.</li><li><span style=\"font-weight: bold; \">A host-based WAF</span> may be fully integrated into an application’s software. This solution is less expensive than a network-based WAF and offers more customizability. The downside of a host-based WAF is the consumption of local server resources, implementation complexity, and maintenance costs. These components typically require engineering time, and may be costly.</li><li><span style=\"font-weight: bold; \">Cloud-based WAFs</span> offer an affordable option that is very easy to implement; they usually offer a turnkey installation that is as simple as a change in DNS to redirect traffic. Cloud-based WAFs also have a minimal upfront cost, as users pay monthly or annually for security as a service. Cloud-based WAFs can also offer a solution that is consistently updated to protect against the newest threats without any additional work or cost on the user’s end. The drawback of a cloud-based WAF is that users hand over the responsibility to a third-party, therefore some features of the WAF may be a black box to them. </li></ul>\r\n<p class=\"align-left\"> </p>\r\n\r\n","materialsDescription":"<p class=\"align-center\"><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">What types of attack WAF prevents?</span></span></p>\r\n<p class=\"align-left\"><span style=\"color: rgb(97, 97, 97); \">WAFs can prevent many attacks, including:</span></p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Cross-site Scripting (XSS) — Attackers inject client-side scripts into web pages viewed by other users.</span></li><li><span style=\"color: rgb(97, 97, 97); \">SQL injection — Malicious code is inserted or injected into an web entry field that allows attackers to compromise the application and underlying systems.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Cookie poisoning — Modification of a cookie to gain unauthorized information about the user for purposes such as identity theft.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Unvalidated input — Attackers tamper with HTTP request (including the url, headers and form fields) to bypass the site’s security mechanisms.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Layer 7 DoS — An HTTP flood attack that utilizes valid requests in typical URL data retrievals.</span></li><li><span style=\"color: rgb(97, 97, 97); \">Web scraping — Data scraping used for extracting data from websites.</span><span style=\"font-weight: bold; \"></span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What are some WAFs Benefits?</span></p>\r\nWeb app firewall prevents attacks that try to take advantage of the vulnerabilities in web-based applications. The vulnerabilities are common in legacy applications or applications with poor coding or designs. WAFs handle the code deficiencies with custom rules or policies.\r\nIntelligent WAFs provide real-time insights into application traffic, performance, security and threat landscape. This visibility gives administrators the flexibility to respond to the most sophisticated attacks on protected applications.\r\nWhen the Open Web Application Security Project identifies the OWASP top vulnerabilities, WAFs allow administrators to create custom security rules to combat the list of potential attack methods. An intelligent WAF analyzes the security rules matching a particular transaction and provides a real-time view as attack patterns evolve. Based on this intelligence, the WAF can reduce false positives.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between a firewall and a Web Application Firewall?</span></p>\r\nA traditional firewall protects the flow of information between servers while a web application firewall is able to filter traffic for a specific web application. Network firewalls and web application firewalls are complementary and can work together.\r\nTraditional security methods include network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). They are effective at blocking bad L3-L4 traffic at the perimeter on the lower end (L3-L4) of the Open Systems Interconnection (OSI) model. Traditional firewalls cannot detect attacks in web applications because they do not understand Hypertext Transfer Protocol (HTTP) which occurs at layer 7 of the OSI model. They also only allow the port that sends and receives requested web pages from an HTTP server to be open or closed. This is why web application firewalls are effective for preventing attacks like SQL injections, session hijacking and Cross-Site Scripting (XSS).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_WAF_web_application_firewall.png"},{"id":489,"title":"Network Security Policy Management","alias":"network-security-policy-management","description":" <span style=\"font-weight: bold; \">Network security policy management </span>streamlines security policy design and enforcement. It applies rules and best practices to manage firewalls and other devices more effectively, efficiently, and consistently. Administrators need network security management solutions to get a high level of visibility into network behavior, automate device configuration, enforce global policies, view firewall traffic, generate reports, and provide a single management interface for physical and virtual systems.\r\nSecurity policies govern the integrity and safety of the network. They provide rules for accessing the network, connecting to the Internet, adding or modifying devices or services, and more. However, rules are only effective when they are implemented. Network security management policy helps organizations stay compliant and secure by ensuring that their policies are simplified, consistent, and enforced. It helps reduce manual tasks and human errors by simplifying administration with security policy and workflow tools through a centralized management interface.\r\nNetwork security management can reduce risk across the network and protect data by leveraging the information on threats, network vulnerabilities and their criticality, evaluating potential options to block an attack, and providing intelligence for decision support. Policy administration is improved by unifying common policy tasks within a single interface, automating policy change workflow, including compliance audits and the management of multiple firewall vendors. This simplified and automated security policy management enables IT teams to save time, avoid manual errors, and reduce risk. \r\nThere are the whole network security policy management market with different tools and solutions available. Businesses use them to automate administrative tasks, which can improve accuracy and save time. The solutions can make management processes less tedious and time consuming, and can free up personnel for higher-value projects. These solutions also help IT teams avoid misconfigurations that can cause vulnerabilities in their networks. And if problems arise, network security policy management solutions can ease troubleshooting and remediation. ","materialsDescription":"<h1 class=\"align-center\">Benefits of network security policy management</h1>\r\n<span style=\"font-weight: bold;\">Streamline security policy design and enforcement</span>\r\nA network security policy management solution can help organizations achieve:\r\n<ul><li><span style=\"font-weight: bold;\">Better security.</span> Network security policy management streamlines security policy design and enforcement.</li><li><span style=\"font-weight: bold;\">Ease of use.</span> Network security policy management tools orchestrate policy design and implementation.</li><li><span style=\"font-weight: bold;\">Consistency. </span>Solutions provide templates, model policies, and configurations.</li><li><span style=\"font-weight: bold;\">Time savings.</span> Deployments are faster, and automation helps empower staff to focus on other business priorities.</li><li><span style=\"font-weight: bold;\">Lower costs.</span> Cloud-based solutions scale to thousands of devices, requiring fewer resources and allowing for centralized management.</li></ul>\r\n<span style=\"font-weight: bold;\">Apply best practices to meet challenges in firewall management</span>\r\nOver time, firewalls collect more and more configuration rules and objects. Network security policy management solutions can help combat this bloat and improve security by addressing:\r\n<ul><li><span style=\"font-weight: bold;\">Object auditing.</span> Administrators need to merge and reduce duplicate objects, determine which unused objects should be deleted, and identify inconsistent objects. Network security policy management tools help them achieve a cleaner, more consistent configuration that is less of a nuisance to manage and less vulnerable to attacks.</li><li><span style=\"font-weight: bold;\">Policy inconsistencies.</span> The network security policy management tools locate unused or shadow policies and assist IT to fix possible problems.</li><li><span style=\"font-weight: bold;\">Version control and upgrades.</span> Network security policy management solutions ease these transitions with filters that simplify and automate processes and ensure high availability.</li></ul>\r\n<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_Security_Policy_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"vmware-carbon-black-cloud":{"id":6116,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/VMW-CB-default-featured-01.png","logo":true,"scheme":false,"title":"VMware Carbon Black Cloud","vendorVerified":1,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":97,"alias":"vmware-carbon-black-cloud","companyTitle":"VMware","companyTypes":["vendor"],"companyId":168,"companyAlias":"vmware","description":" \r\n<span lang=\"EN-US\">VMware Carbon Black Cloud is a cloud native endpoint and workload protection platform (EPP and CWP) that combines the intelligent system hardening and behavioral prevention needed to keep emerging threats at bay, using a single lightweight agent and an easy-to-use console. By analyzing more than 1 trillion security events per day, VMware Carbon Black Cloud proactively uncovers attackers’ behavior patterns and empowers defenders to detect and stop emerging attacks. As a key means to realizing intrinsic security, VMware Carbon Black Cloud simplifies and strengthens your approach to security across any app, any cloud, and any device.</span>\r\n\r\n<span style=\"font-weight: bold; \">Adaptive Prevention Delivers Better Protection</span>\r\nThe majority of today’s cyberattacks feature advanced tactics such as lateral movement and island hopping that target legitimate tools to inflict damage. These sophisticated hacking methods pose a tremendous risk to targets with decentralized systems protecting high-value assets, including money, intellectual property and state secrets.\r\nVMware Carbon Black CloudTM thwarts attacks by making it easier to:\r\n<ul><li>Analyze billions of system events to understand what is normal in your environment</li></ul>\r\n<ul><li>Prevent attackers from abusing legitimate tools</li></ul>\r\n<ul><li>Automate your investigation workflow to respond efficiently</li></ul>\r\nAll of this is unified into one console and one agent, so that infrastructure and InfoSec teams have a single, shared source of truth to improve security together.\r\n<span style=\"font-weight: bold; \">One Platform for Your Endpoint Security Needs</span>\r\nVMware Carbon Black Cloud consolidates multiple endpoint security capabilities using one agent and console, helping you operate faster and more effectively. As part of VMware’s intrinsic security approach, VMware Carbon Black Cloud spans the system hardening and threat prevention workflow to accelerate responses and defend against a variety of threats.\r\n<span style=\"font-weight: bold; \">Endpoint standard – next-generation antivirus and behavioral EDR</span>\r\nAnalyze attacker behavior patterns over time to detect and stop never-seen-before attacks, whether they are malware, fileless or living-off-the-land attacks.\r\n<span style=\"font-weight: bold; \">Managed detection – managed alert monitoring and triage</span><br />Gain 24-hour visibility from our security operations center of expert analysts, who provide validation, context into root cause and automated monthly executive reporting.\r\n<span style=\"font-weight: bold; \">Audit and remediation – real-time device assessment and remediation</span>\r\nEasily audit the current system state to track and harden the security posture of all your protected devices.\r\n<span style=\"font-weight: bold; \">Enterprise EDR – threat hunting and containment</span>\r\nProactively hunt for abnormal activity using threat intelligence and customizable detections.","shortDescription":"VMware Carbon Black Cloud is a cloud native endpoint and workload protection platform that combines the intelligent system hardening and behavioral prevention ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"VMware Carbon Black Cloud","keywords":"","description":" \r\n<span lang=\"EN-US\">VMware Carbon Black Cloud is a cloud native endpoint and workload protection platform (EPP and CWP) that combines the intelligent system hardening and behavioral prevention needed to keep emerging threats at bay, using a single lightweigh","og:title":"VMware Carbon Black Cloud","og:description":" \r\n<span lang=\"EN-US\">VMware Carbon Black Cloud is a cloud native endpoint and workload protection platform (EPP and CWP) that combines the intelligent system hardening and behavioral prevention needed to keep emerging threats at bay, using a single lightweigh","og:image":"https://old.roi4cio.com/fileadmin/user_upload/VMW-CB-default-featured-01.png"},"eventUrl":"","translationId":6117,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"vmware-carbon-black-cloud-audit-and-remediation":{"id":6118,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/VMW-CB-default-featured-01.png","logo":true,"scheme":false,"title":"VMware Carbon Black Cloud Audit and Remediation","vendorVerified":1,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":97,"alias":"vmware-carbon-black-cloud-audit-and-remediation","companyTitle":"VMware","companyTypes":["vendor"],"companyId":168,"companyAlias":"vmware","description":"<span style=\"font-weight: bold;\">Real-Time Device Assessment & Remediation</span>\r\nEven the most effective security teams are often forced to play catch up during emergency situations due to limited time and resources to perform regular, proactive analysis and evaluate potential risks.\r\nAny delays during the investigation prolongs downtime and leaves the organization open to increased risk. Once the scope of an attack is understood, dispersed processes and tool sets can cause bottlenecks that delay the remediation of problematic endpoints.\r\nVMware Carbon Black Audit and Remediation is a real-time assessment and remediation solution that gives teams faster, easier access to audit and change the system state of endpoints across their organization.\r\nBy providing administrators with real-time query capabilities from a cloud-native endpoint protection platform, Audit and Remediation enables teams to make quick, confident decisions to harden systems and improve security posture. Audit and Remediation closes the gap between security and operations, allowing administrators to perform full investigations and take action to remotely remediate endpoints all from a single solution.<br /><br /><span style=\"font-weight: bold;\">KEY CAPABILITIES</span>\r\n<span style=\"font-weight: bold;\">Single Agent, Cloud Platform</span>\r\nAudit and Remediation is built on the PSC, a cloud-native endpoint protection platform that offers converged prevention, detection, and response with additional services that can be activated as you need them, using the same converged agent, without any additional deployment or infrastructure.\r\n<span style=\"font-weight: bold;\">On-Demand Queries</span>\r\nAudit and Remediation gives your Security & IT Operations team visibility into even the most precise about the current system state of all endpoints, enabling you to make quick, confident decisions to reduce risk.\r\n<span style=\"font-weight: bold;\">Immediate Remote Remediation</span>\r\nAudit and Remediation closes the gap between security and operations, giving administrators a remote shell directly into endpoints to perform full investigations and remote remediations all from a single cloud-based platform.\r\n<span style=\"font-weight: bold;\">Simplified Operational Reporting</span>\r\nAudit and Remediation allows you to schedule daily, weekly, or monthly queries to automate operational reporting on patch levels, user privileges, disk encryption status and more to track & maintain the desired state of your ever-changing environment.<br /><span style=\"font-weight: bold;\"><br />BENEFITS</span>\r\n<ul><li>Execute abroad range of operational activities quickly and confidently</li></ul>\r\n<ul><li>Establish proactive IT hygiene to prevent attacks</li><li>Build consistency into operational reporting and auditing processes</li></ul>\r\n<ul><li>Remove barriers between security analysis and IT operations</li><li>Extend existing investigation and remediation capabilities</li><li>Replace adhoc scripts and manual tasks with a structured security platform</li><li>Automate operational reporting with scheduled queries</li></ul>\r\n<br /><span style=\"font-weight: bold;\">AUDIT AND REMEDIATION</span>\r\n<ul><li>Leverages the same agenta nd console as NGAV, EDR and threat hunting platform</li><li>Cloud-based storage of all query results</li><li>Easy access to unified data across Security and IT teams</li></ul>\r\n<br /><span style=\"font-weight: bold;\">FEATURES</span>\r\n<ul><li>Pre-Built Recommended Queries</li><li>SQL query (open text field)</li><li>Query Scheduler</li><li>Copy & Re-run Queries</li><li>Save and favorite queries</li><li>Email notifications</li><li>Filter and group results</li><li>Data export</li><li>Secure shell for remote remediation</li><li>Two-way API</li></ul>\r\n<br /><span style=\"font-weight: bold;\">PLATFORMS</span>\r\n<ul><li>Windows 7 and above</li><li>Windows Server 2008 R2 and above</li><li>MacOS 10.10 and above</li><li>RedHat 6 and above</li><li>CentOS 6 and above</li><li>Ubuntu 16.04 and above</li><li>SUSE 12 and above</li><li>OpenS USE 15 & 42</li><li>Amazon Linux 2</li></ul>","shortDescription":"VMware Carbon Black® Cloud Audit and Remediation™: Secure sensitive data against advanced attacks with a cloud native endpoint protection platform.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"VMware Carbon Black Cloud Audit and Remediation","keywords":"","description":"<span style=\"font-weight: bold;\">Real-Time Device Assessment & Remediation</span>\r\nEven the most effective security teams are often forced to play catch up during emergency situations due to limited time and resources to perform regular, proactive analysis","og:title":"VMware Carbon Black Cloud Audit and Remediation","og:description":"<span style=\"font-weight: bold;\">Real-Time Device Assessment & Remediation</span>\r\nEven the most effective security teams are often forced to play catch up during emergency situations due to limited time and resources to perform regular, proactive analysis","og:image":"https://old.roi4cio.com/fileadmin/user_upload/VMW-CB-default-featured-01.png"},"eventUrl":"","translationId":6119,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":465,"title":"UEBA - User and Entity Behavior Analytics","alias":"ueba-user-and-entity-behavior-analytics","description":"Developments in UBA technology led Gartner to evolve the category to user and entity behavior analytics (UEBA). In September 2015, Gartner published the Market Guide for User and Entity Analytics by Vice President and Distinguished Analyst, Avivah Litan, that provided a thorough definition and explanation. UEBA was referred to in earlier Gartner reports but not in much depth. Expanding the definition from UBA includes devices, applications, servers, data, or anything with an IP address. It moves beyond the fraud-oriented UBA focus to a broader one encompassing "malicious and abusive behavior that otherwise went unnoticed by existing security monitoring systems, such as SIEM and DLP." The addition of "entity" reflects that devices may play a role in a network attack and may also be valuable in uncovering attack activity. "When end users have been compromised, malware can lay dormant and go undetected for months. Rather than trying to find where the outsider entered, UEBAs allow for quicker detection by using algorithms to detect insider threats."\r\nParticularly in the computer security market, there are many vendors for UEBA applications. They can be "differentiated by whether they are designed to monitor on-premises or cloud-based software as a service (SaaS) applications; the methods in which they obtain the source data; the type of analytics they use (i.e., packaged analytics, user-driven or vendor-written), and the service delivery method (i.e., on-premises or a cloud-based)." According to the 2015 market guide released by Gartner, "the UEBA market grew substantially in 2015; UEBA vendors grew their customer base, market consolidation began, and Gartner client interest in UEBA and security analytics increased." The report further projected, "Over the next three years, leading UEBA platforms will become preferred systems for security operations and investigations at some of the organizations they serve. It will be—and in some cases already is—much easier to discover some security events and analyze individual offenders in UEBA than it is in many legacy security monitoring systems."","materialsDescription":"<span style=\"font-weight: bold;\">What is UEBA?</span>\r\nHackers can break into firewalls, send you e-mails with malicious and infected attachments, or even bribe an employee to gain access into your firewalls. Old tools and systems are quickly becoming obsolete, and there are several ways to get past them.\r\nUser and entity behavior analytics (UEBA) give you more comprehensive way of making sure that your organization has top-notch IT security, while also helping you detect users and entities that might compromise your entire system.\r\nUEBA is a type of cybersecurity process that takes note of the normal conduct of users. In turn, they detect any anomalous behavior or instances when there are deviations from these “normal” patterns. For example, if a particular user regularly downloads 10 MB of files every day but suddenly downloads gigabytes of files, the system would be able to detect this anomaly and alert them immediately.\r\nUEBA uses machine learning, algorithms, and statistical analyses to know when there is a deviation from established patterns, showing which of these anomalies could result in, potentially, a real threat. UEBA can also aggregate the data you have in your reports and logs, as well as analyze the file, flow, and packet information.\r\nIn UEBA, you do not track security events or monitor devices; instead, you track all the users and entities in your system. As such, UEBA focuses on insider threats, such as employees who have gone rogue, employees who have already been compromised, and people who already have access to your system and then carry out targeted attacks and fraud attempts, as well as servers, applications, and devices that are working within your system.\r\n<span style=\"font-weight: bold;\">What are the benefits of UEBA?</span>\r\nIt is the unfortunate truth that today's cybersecurity tools are fast becoming obsolete, and more skilled hackers and cyber attackers are now able to bypass the perimeter defenses that are used by most companies. In the old days, you were secure if you had web gateways, firewalls, and intrusion prevention tools in place. This is no longer the case in today’s complex threat landscape, and it’s especially true for bigger corporations that are proven to have very porous IT perimeters that are also very difficult to manage and oversee.\r\nThe bottom line? Preventive measures are no longer enough. Your firewalls are not going to be 100% foolproof, and hackers and attackers will get into your system at one point or another. This is why detection is equally important: when hackers do successfully get into your system, you should be able to detect their presence quickly in order to minimize the damage.\r\n<span style=\"font-weight: bold;\">How Does UEBA Work?</span>\r\nThe premise of UEBA is actually very simple. You can easily steal an employee’s user name and password, but it is much harder to mimic the person’s normal behavior once inside the network.\r\nFor example, let’s say you steal Jane Doe’s password and user name. You would still not be able to act precisely like Jane Doe once in the system unless given extensive research and preparation. Therefore, when Jane Doe’s user name is logged in to the system, and her behavior is different than that of typical Jane Doe, that is when UEBA alerts start to sound.\r\nAnother relatable analogy would be if your credit card was stolen. A thief can pickpocket your wallet and go to a high-end shop and start spending thousands of dollars using your credit card. If your spending pattern on that card is different from the thief’s, the company’s fraud detection department will often recognize the abnormal spending and block suspicious purchases, issuing an alert to you or asking you to verify the authenticity of a transaction.\r\nAs such, UEBA is a very important component of IT security, allowing you to:\r\n1. Detect insider threats. It is not too far-fetched to imagine that an employee, or perhaps a group of employees, could go rogue, stealing data and information by using their own access. UEBA can help you detect data breaches, sabotage, privilege abuse and policy violations made by your own staff.\r\n2. Detect compromised accounts. Sometimes, user accounts are compromised. It could be that the user unwittingly installed malware on his or her machine, or sometimes a legitimate account is spoofed. UEBA can help you weed out spoofed and compromised users before they can do real harm.\r\n3. Detect brute-force attacks. Hackers sometimes target your cloud-based entities as well as third-party authentication systems. With UEBA, you are able to detect brute-force attempts, allowing you to block access to these entities.\r\n4. Detect changes in permissions and the creation of super users. Some attacks involve the use of super users. UEBA allows you to detect when super users are created, or if there are accounts that were granted unnecessary permissions.\r\n5. Detect breach of protected data. If you have protected data, it is not enough to just keep it secure. You should know when a user accesses this data when he or she does not have any legitimate business reason to access it.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_User_and_Entity_Behavior_Analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"vmware-carbon-black-cloud-endpoint-standard":{"id":6120,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/VMW-CB-default-featured-01.png","logo":true,"scheme":false,"title":"VMware Carbon Black Cloud Endpoint Standard","vendorVerified":1,"rating":"2.80","implementationsCount":3,"suppliersCount":0,"supplierPartnersCount":97,"alias":"vmware-carbon-black-cloud-endpoint-standard","companyTitle":"VMware","companyTypes":["vendor"],"companyId":168,"companyAlias":"vmware","description":"<span style=\"font-weight: bold;\">Prevention for Today’s Advanced Cyber Attacks</span>\r\nProtect your organization and customer data with an easy-to-manage, cloud-native endpoint protection platform (EPP) that combines prevention and automated detection to defend your organization from today’s advanced cyber attacks.\r\nThe VMware Carbon Black Cloud Endpoint Standard is a next-generation antivirus (NGAV) and endpoint detection and response (EDR) solution that protects against the full spectrum of modern cyber attacks. Using the VMware Carbon Black Cloud’s universal agent and console, the solution applies behavioral analytics to endpoint events to streamline detection, prevention, and response to cyber attacks.\r\n<span style=\"font-weight: bold;\">Multi-level protection</span>\r\nCyber attackers are innovating faster than traditional defenses can withstand. Our next-generation antivirus (NGAV) solution employs multiple protection layers including file reputation and heuristics, machine learning, and behavioral models to analyze endpoint activity and block malicious behavior to stop all types of attacks before they reach critical systems. With flexible behavioral prevention policies, protection is easily tailored to your organization’s distinct needs.\r\n<span style=\"font-weight: bold;\">Enhance endpoint protection and operations</span>\r\nPrevent malicious attacks on your organization’s resources with a single NGAV and endpoint detection and response solution offering comprehensive prevention and endpoint activity analysis capabilities, and free up resources with our easy-to-use cloud platform for fast integration into your existing systems.\r\n\r\n<span style=\"font-weight: bold;\">Features:</span>\r\n<span style=\"font-weight: bold;\">Protection from known and emerging attacks and in-product alerts on the latest attacks from our security experts</span>\r\n<ul> <li>Comprehensive protection of your organization’s data and customer information from malware, non-malware and living off the land (LotL) attacks.</li> <li>Simplified deployment and operation with out-of-the-box policies to adapt protection to your organization.</li> </ul>\r\n<ul> <li>Stay up to date on the latest attacks with in-product updates from our expert Threat Analysis Unit (TAU).</li> </ul>\r\n<span style=\"font-weight: bold;\">Prioritized alerts, attack chain visualizations, and in-product response capabilities</span>\r\n<ul> <li>Save money and time investigating and responding to incidents. With visibility into the entire attack chain and endpoint activity analysis, there’s no need to spend time tracking down which of your systems were affected and when.</li> </ul>\r\n<ul> <li>Respond remotely and minimize downtime to endpoints with a tool that allows you to instantly roll back attacks from the console.</li> </ul>\r\n<span style=\"font-weight: bold;\">Flexible security policies</span>\r\n<ul> <li>Tailor policies to your organization’s specific needs for easy integration into your existing systems and security practices, with less false positives.</li> </ul>\r\n<span style=\"font-weight: bold;\">Single agent and cloud-native platform</span>\r\n<ul> <li>Simplify your security stack and return critical CPU cycles while improving performance on endpoints with an easy-touse, single cloud platform and agent.</li> </ul>\r\n<span style=\"font-weight: bold;\">Active, engaged user community of internal security experts and peers</span>\r\n<ul> <li>Get answers fast on how to use the product, and learn about the latest attacks and remediation tips from our expert Threat Analysis team and industry peers, with access to our User Exchange community.</li> </ul>\r\n<br /><span style=\"font-weight: bold;\">Benefits:</span>\r\n<ul> <li>Protection from known and unknown attacks</li> </ul>\r\n<ul> <li>Clear alerts and prioritization of potential attacks</li> </ul>\r\n<ul> <li>Easier investigation into security incidents</li> </ul>\r\n<ul> <li>Faster mean time to resolution (MTTR)</li> </ul>\r\n<ul> <li>Reduced overhead; no infrastructure required</li> </ul>\r\n<br /><span style=\"font-weight: bold;\">Operating Systems:</span>\r\n<ul> <li>Windows: Windows 7/8/10</li> </ul>\r\n<ul> <li>macOS X: 10.6.8+</li> </ul>\r\n<ul> <li>Linux RedHat (RHEL) & CentOS 6/7</li> </ul>\r\n<ul> <li>Windows 2008 R2</li> </ul>\r\n<ul> <li>Windows 2012</li> </ul>\r\n<ul> <li>Windows 2012 R2</li> </ul>\r\n<ul> <li>Windows 2016</li> </ul>\r\n<ul> <li>Windows 2019</li> </ul>","shortDescription":"VMware Carbon Black Cloud Endpoint Standard - next-generation antivirus and behavioral EDR delivers prevention for today’s advanced cyberattacks\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"VMware Carbon Black Cloud Endpoint Standard","keywords":"","description":"<span style=\"font-weight: bold;\">Prevention for Today’s Advanced Cyber Attacks</span>\r\nProtect your organization and customer data with an easy-to-manage, cloud-native endpoint protection platform (EPP) that combines prevention and automated detection to defen","og:title":"VMware Carbon Black Cloud Endpoint Standard","og:description":"<span style=\"font-weight: bold;\">Prevention for Today’s Advanced Cyber Attacks</span>\r\nProtect your organization and customer data with an easy-to-manage, cloud-native endpoint protection platform (EPP) that combines prevention and automated detection to defen","og:image":"https://old.roi4cio.com/fileadmin/user_upload/VMW-CB-default-featured-01.png"},"eventUrl":"","translationId":6121,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"},{"id":838,"title":"Endpoint Detection and Response","alias":"endpoint-detection-and-response","description":"Endpoint Detection and Response (EDR) is a cybersecurity technology that addresses the need for continuous monitoring and response to advanced threats. It is a subset of endpoint security technology and a critical piece of an optimal security posture. EDR differs from other endpoint protection platforms (EPP) such as antivirus (AV) and anti-malware in that its primary focus isn't to automatically stop threats in the pre-execution phase on an endpoint. Rather, EDR is focused on providing the right endpoint visibility with the right insights to help security analysts discover, investigate and respond to very advanced threats and broader attack campaigns stretching across multiple endpoints. Many EDR tools, however, combine EDR and EPP.\r\nWhile small and mid-market organizations are increasingly turning to EDR technology for more advanced endpoint protection, many lack the resources to maximize the benefits of the technology. Utilizing advanced EDR features such as forensic analysis, behavioral monitoring and artificial intelligence (AI) is labor and resource intensive, requiring the attention of dedicated security professionals.\r\nA managed endpoint security service combines the latest technology, an around-the-clock team of certified CSOC experts and up-to-the-minute industry intelligence for a cost-effective monthly subscription. Managed services can help reduce the day-to-day burden of monitoring and responding to alerts, enhance security orchestration and automation (SOAR) and improve threat hunting and incident response.","materialsDescription":"<span style=\"font-weight: bold; \">What is Endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response is an emerging technology that addresses the need for continuous monitoring and response to advanced threats. One could even make the argument that endpoint detection and response is a form of advanced threat protection.\r\n<span style=\"font-weight: bold;\">What are the Key Aspects of EDR Security?</span>\r\nAccording to Gartner, effective EDR must include the following capabilities:\r\n<ul><li>Incident data search and investigation</li><li>Alert triage or suspicious activity validation</li><li>Suspicious activity detection</li><li>Threat hunting or data exploration</li><li>Stopping malicious activity</li></ul>\r\n<span style=\"font-weight: bold;\">What to look for in an EDR Solution?</span>\r\nUnderstanding the key aspects of EDR and why they are important will help you better discern what to look for in a solution. It’s important to find EDR software that can provide the highest level of protection while requiring the least amount of effort and investment — adding value to your security team without draining resources. Here are the six key aspects of EDR you should look for:\r\n<span style=\"font-weight: bold;\">1. Visibility:</span> Real-time visibility across all your endpoints allows you to view adversary activities, even as they attempt to breach your environment and stop them immediately.\r\n<span style=\"font-weight: bold;\">2. Threat Database:</span> Effective EDR requires massive amounts of telemetry collected from endpoints and enriched with context so it can be mined for signs of attack with a variety of analytic techniques.\r\n<span style=\"font-weight: bold;\">3. Behavioral Protection:</span> Relying solely on signature-based methods or indicators of compromise (IOCs) lead to the “silent failure” that allows data breaches to occur. Effective endpoint detection and response requires behavioral approaches that search for indicators of attack (IOAs), so you are alerted of suspicious activities before a compromise can occur.\r\n<span style=\"font-weight: bold;\">4. Insight and Intelligence:</span> An endpoint detection and response solution that integrates threat intelligence can provide context, including details on the attributed adversary that is attacking you or other information about the attack.\r\n<span style=\"font-weight: bold;\">5. Fast Response:</span> EDR that enables a fast and accurate response to incidents can stop an attack before it becomes a breach and allow your organization to get back to business quickly.\r\n<span style=\"font-weight: bold;\">6. Cloud-based Solution:</span> Having a cloud-based endpoint detection and response solution is the only way to ensure zero impact on endpoints while making sure capabilities such as search, analysis and investigation can be done accurately and in real time.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/hgghghg.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"vmware-carbon-black-cloud-enterprise-edr":{"id":5739,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/VMWARE_CARBON_BLACK_CLOUD_ENTERPRISE_EDR.png","logo":true,"scheme":false,"title":"VMware Carbon Black Cloud Enterprise EDR","vendorVerified":1,"rating":"1.70","implementationsCount":3,"suppliersCount":0,"supplierPartnersCount":97,"alias":"vmware-carbon-black-cloud-enterprise-edr","companyTitle":"VMware","companyTypes":["vendor"],"companyId":168,"companyAlias":"vmware","description":"Enterprise security teams struggle to get their hands on the endpoint data they need to investigate and proactively hunt for abnormal behavior. Security and IT professionals currently lack the ability to see beyond suspicious activity and need a way to dive deeper into the data to make their own judgments.\r\nVMware Carbon Black Enterprise EDR is an advanced threat hunting and incident response solution delivering continuous visibility for top security operations centers (SOCs) and incident response (IR) teams. Enterprise EDR is delivered through the VMware Carbon Black Cloud, a next-generation endpoint protection platform that consolidates security in the cloud using a single agent, console and dataset.\r\nUsing data continuously collected and sent to the VMware Carbon Black Cloud, Enterprise EDR provides immediate access to the most complete picture of an attack at all times, reducing lengthy investigations from days to minutes. This empowers teams to proactively hunt for threats, uncover suspicious behavior, disrupt active attacks and address gaps in defenses before attackers can.\r\nAlong with continuous visibility, Enterprise EDR gives you the power to respond and remediate in real time, stopping active attacks and repairing damage quickly.<br /><br /><span style=\"font-weight: bold;\">Key Capabilities</span>\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Complete Endpoint Protection Platform</span></span>\r\nBuilt on the VMware Carbon Black Cloud, Enterprise EDR provides advanced threat hunting and incident response functionality from the same agent and console as our NGAV, EDR and real-time query solutions, allowing your team to consolidate multiple point products with a converged platform.\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Continuous & Centralized Recording</span></span>\r\nCentralized access to continuously collected data means that security professionals have all the information they need to hunt threats in real time as well as conduct in-depth investigations after a breach has occurred.\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Attack Chain Visualization & Search</span></span>\r\nEnterprise EDR provides intuitive attack chain visualization to make identifying root cause fast and easy. Analysts can quickly jump through each stage of an attack to gain insight into the attacker’s behavior, close security gaps, and learn from every new attack technique to avoid falling victim to the same attack twice.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Live Response for Remote Remediation</span></span><br />With Live Response, incident responders can create a secure connection to infected hosts to pull or push files, kill processes, perform memory dumps and quickly remediate from anywhere in the world.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Automation via Integrations & Open APIs</span></span>\r\nCarbon Black boasts a robust partner ecosystem and open platform that allows security teams to integrate products like Enterprise EDR into their existing security stack.<br /><br /><span style=\"font-weight: bold;\">BENEFITS</span>\r\n\r\n<ul><li>Reduced complexity for more efficient endpoint security</li></ul>\r\n<ul><li>Easy deployment,automated updates, and elastic scalability</li></ul>\r\n<ul><li>Accelerated investigations with continuous endpoint visibility</li></ul>\r\n<ul><li>Complete understanding of root cause to close existing gaps</li></ul>\r\n<ul><li>Secure remote access for investigations</li></ul>\r\n<ul><li>Greatly reduced dwell time and average time to resolution</li></ul>\r\n<br /><span style=\"font-weight: bold;\">FEATURES</span>\r\n<ul><li>Lightweight sensor deployed and managed from the cloud</li></ul>\r\n<ul><li>Process and binary search of centralized, unfiltered data</li></ul>\r\n<ul><li>Out-of-the-box and customizable behavioral detection</li></ul>\r\n<ul><li>Proprietary and third-party threat intel feeds</li></ul>\r\n<ul><li>Automated watchlist store-run queries</li></ul>\r\n<ul><li>Interactive and expandable attack chain visualization</li></ul>\r\n<ul><li>Secure remote shell for rapid remediation</li></ul>\r\n<ul><li>Open APIs</li></ul>\r\n<span style=\"font-weight: bold;\"><br />PLATFORMS</span>\r\n<ul><li>Windows</li></ul>\r\n<ul><li>macOS</li></ul>\r\n<ul><li>Red Hat</li></ul>\r\n<ul><li>CentOS</li></ul>","shortDescription":"Cloud-based threat hunting and incident response (IR) solution delivering continuous visibility for top security operations centers (SOC) and IR teams.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"VMware Carbon Black Cloud Enterprise EDR","keywords":"","description":"Enterprise security teams struggle to get their hands on the endpoint data they need to investigate and proactively hunt for abnormal behavior. Security and IT professionals currently lack the ability to see beyond suspicious activity and need a way to dive de","og:title":"VMware Carbon Black Cloud Enterprise EDR","og:description":"Enterprise security teams struggle to get their hands on the endpoint data they need to investigate and proactively hunt for abnormal behavior. Security and IT professionals currently lack the ability to see beyond suspicious activity and need a way to dive de","og:image":"https://old.roi4cio.com/fileadmin/user_upload/VMWARE_CARBON_BLACK_CLOUD_ENTERPRISE_EDR.png"},"eventUrl":"","translationId":5740,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":107,"title":"Endpoint Detection and Response"}],"testingArea":"","categories":[{"id":838,"title":"Endpoint Detection and Response","alias":"endpoint-detection-and-response","description":"Endpoint Detection and Response (EDR) is a cybersecurity technology that addresses the need for continuous monitoring and response to advanced threats. It is a subset of endpoint security technology and a critical piece of an optimal security posture. EDR differs from other endpoint protection platforms (EPP) such as antivirus (AV) and anti-malware in that its primary focus isn't to automatically stop threats in the pre-execution phase on an endpoint. Rather, EDR is focused on providing the right endpoint visibility with the right insights to help security analysts discover, investigate and respond to very advanced threats and broader attack campaigns stretching across multiple endpoints. Many EDR tools, however, combine EDR and EPP.\r\nWhile small and mid-market organizations are increasingly turning to EDR technology for more advanced endpoint protection, many lack the resources to maximize the benefits of the technology. Utilizing advanced EDR features such as forensic analysis, behavioral monitoring and artificial intelligence (AI) is labor and resource intensive, requiring the attention of dedicated security professionals.\r\nA managed endpoint security service combines the latest technology, an around-the-clock team of certified CSOC experts and up-to-the-minute industry intelligence for a cost-effective monthly subscription. Managed services can help reduce the day-to-day burden of monitoring and responding to alerts, enhance security orchestration and automation (SOAR) and improve threat hunting and incident response.","materialsDescription":"<span style=\"font-weight: bold; \">What is Endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response is an emerging technology that addresses the need for continuous monitoring and response to advanced threats. One could even make the argument that endpoint detection and response is a form of advanced threat protection.\r\n<span style=\"font-weight: bold;\">What are the Key Aspects of EDR Security?</span>\r\nAccording to Gartner, effective EDR must include the following capabilities:\r\n<ul><li>Incident data search and investigation</li><li>Alert triage or suspicious activity validation</li><li>Suspicious activity detection</li><li>Threat hunting or data exploration</li><li>Stopping malicious activity</li></ul>\r\n<span style=\"font-weight: bold;\">What to look for in an EDR Solution?</span>\r\nUnderstanding the key aspects of EDR and why they are important will help you better discern what to look for in a solution. It’s important to find EDR software that can provide the highest level of protection while requiring the least amount of effort and investment — adding value to your security team without draining resources. Here are the six key aspects of EDR you should look for:\r\n<span style=\"font-weight: bold;\">1. Visibility:</span> Real-time visibility across all your endpoints allows you to view adversary activities, even as they attempt to breach your environment and stop them immediately.\r\n<span style=\"font-weight: bold;\">2. Threat Database:</span> Effective EDR requires massive amounts of telemetry collected from endpoints and enriched with context so it can be mined for signs of attack with a variety of analytic techniques.\r\n<span style=\"font-weight: bold;\">3. Behavioral Protection:</span> Relying solely on signature-based methods or indicators of compromise (IOCs) lead to the “silent failure” that allows data breaches to occur. Effective endpoint detection and response requires behavioral approaches that search for indicators of attack (IOAs), so you are alerted of suspicious activities before a compromise can occur.\r\n<span style=\"font-weight: bold;\">4. Insight and Intelligence:</span> An endpoint detection and response solution that integrates threat intelligence can provide context, including details on the attributed adversary that is attacking you or other information about the attack.\r\n<span style=\"font-weight: bold;\">5. Fast Response:</span> EDR that enables a fast and accurate response to incidents can stop an attack before it becomes a breach and allow your organization to get back to business quickly.\r\n<span style=\"font-weight: bold;\">6. Cloud-based Solution:</span> Having a cloud-based endpoint detection and response solution is the only way to ensure zero impact on endpoints while making sure capabilities such as search, analysis and investigation can be done accurately and in real time.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/hgghghg.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["axis-f","dell-poweredge-mx7000-modular-chassis","dell-precision-workstations","dell-wyse-3040-thin-client","dell-bleid-massiv-equallogic-ps-m4110","dell-obshchaja-infrastruktura-konvergentnye-platformy","dell-servery-poweredge-v-korpuse-tower","dell-stoechnyi-server-poweredge-c6320","dell-upravlenie-klientskimi-sistemami","intel-server-chassis-and-system","intelr-storage-system","nsx-sd-wan-by-velocloud","poweredge-rack-server","v5-systems-onsound-acoustic-gunshot-detection","vmware-airwatch-enterprise-mobility-management","vmware-carbon-black-app-control","vmware-carbon-black-cloud","vmware-carbon-black-cloud-audit-and-remediation","vmware-carbon-black-cloud-endpoint-standard","vmware-carbon-black-cloud-enterprise-edr"]},"links":{"first":"http://b4r_be/api/products?page=1","last":"http://b4r_be/api/products?page=2","prev":null,"next":"http://b4r_be/api/products?page=2"},"meta":{"current_page":1,"from":1,"last_page":2,"path":"http://b4r_be/api/products","per_page":20,"to":20,"total":39},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"62":{"id":62,"title":"Rack server"},"89":{"id":89,"title":"MDM - Mobile Device Management"},"93":{"id":93,"title":"Software-Defined WAN (SD-WAN)"},"107":{"id":107,"title":"Endpoint Detection and Response"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}