{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"products":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"_type":"localeString","en":"I use it","ru":"I use it"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"en":"Selling","ru":"Продают","_type":"localeString"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"sort-title-desc":{"ru":"от Я до А","_type":"localeString","en":"From Z to A"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"en":"Rating descending","ru":"По убыванию рейтинга","_type":"localeString"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"en":"Rebate descending","ru":"По убыванию скидки","_type":"localeString"},"i-use-it-popover":{"en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString"},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"rebate-for-poc":{"en":"Bonus 4 POC","ru":"Бонус 4 POC","_type":"localeString"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"vendor-verified":{"_type":"localeString","en":"Vendor verified","ru":"Поставщик потверждён"},"program-sends-data":{"_type":"localeString","en":"Program sends data"},"learn-more-btn":{"ru":"Узнать больше","_type":"localeString","en":"Learn more"},"categories-popover":{"ru":"категории","_type":"localeString","en":"categories"},"sort-popular-asc":{"en":"Popular ascending","ru":"По возростанию популярности","_type":"localeString"},"sort-popular-desc":{"ru":"По убыванию популярности","_type":"localeString","en":"Popular descending"},"no-results":{"en":"No results found. We didn't find any results with the filter you selected.","ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString"},"login":{"ru":"Войти","_type":"localeString","en":"Login","de":"Einloggen"},"register":{"de":"Registrieren","ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"auth-message":{"en":"You need to register or login.","de":"Sie müssen sich registrieren oder anmelden","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString"},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"en":"Added to comparison","ru":"Добавлено в сравнения","_type":"localeString"},"items-found":{"_type":"localeString","en":"Products found","ru":"Продуктов найдено"},"sort-sales-desc":{"en":"By sale","ru":"По продаже","_type":"localeString"},"sort-purchases-desc":{"ru":"По покупке","_type":"localeString","en":"By purchase"},"product-supplier":{"ru":"Поставщик продукта","_type":"localeString","en":"Product supplier"},"product-vendor":{"_type":"localeString","en":"Product producer","ru":"Производитель продукта"},"products-fetching-error":{"ru":"Произошла ошибка. Перезагрузите пожалуйста страницу.","_type":"localeString","en":"An error has occurred. Please reload the page."}},"header":{"help":{"_type":"localeString","en":"Help","de":"Hilfe","ru":"Помощь"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"_type":"localeString","en":"Received ROI","ru":"Полученный ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"en":"from","ru":"от","_type":"localeString"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"en":"Filter by price","ru":"Фильтр по цене","_type":"localeString"},"view-type-label":{"en":"View","ru":"Вид","_type":"localeString"},"sort-type-label":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"category":{"ru":"Категория","_type":"localeString","en":"Category"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"_type":"localeString","en":"Add Product","ru":"Добавить продукт"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"ru":"Очистить","_type":"localeString","en":"Сlear"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"en":"Providers","ru":"Поставщик, производитель","_type":"localeString"},"business-tasks-field":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"problems-field":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"with-discounts-checkbox":{"_type":"localeString","en":"With discounts","ru":"Со скидками"},"expert-price-checkbox":{"_type":"localeString","en":"Configurator","ru":"Конфигуратор"},"roi-calculator-checkbox":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"apply-filter-button":{"en":"Apply filter","ru":"Применить фильтр","_type":"localeString"},"sorting-toggle":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"show-all-button":{"_type":"localeString","en":"Show all","ru":"Показать все"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"ru":"С внедрениями","_type":"localeString","en":"With deployments"},"bonus-4-reference":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 Reference"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"_type":"localeString","en":"Countries","ru":"Страны"},"seller":{"en":"Seller","ru":"Продавец","_type":"localeString"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"en":"User suppliers","ru":"Поставщики пользователя","_type":"localeString"},"business-process":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"business-objectives":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"branch":{"en":" Branch","ru":"Отрасль","_type":"localeString"},"users":{"_type":"localeString","en":"Users","ru":"Пользователи"},"status":{"en":"Status","ru":"Статус","_type":"localeString"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"en":"With reference","ru":"С референсами","_type":"localeString"},"show-deal-checkbox":{"_type":"localeString","en":"Show deal with noname","ru":"Показывать сделки с noname"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"find":{"_type":"localeString","en":"Find","ru":"Выполнить поиск"},"deal-date":{"en":"Date","ru":"Дата","_type":"localeString"},"try-button":{"_type":"localeString","en":"Try AI (Beta)","ru":"Попробовать AI (Beta)"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"_type":"localeString","en":"Company size","ru":"Размер компании"},"add-company":{"_type":"localeString","en":"Add company","ru":"Добавить компанию"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"ru":"От Я до А","_type":"localeString","en":"From Z to A"},"sellers-field":{"_type":"localeString","en":"Sellers","ru":"Поставщики, Производители"},"supply-types":{"ru":"Тип поставки","_type":"localeString","en":"Supply type"},"with-comments-checkbox":{"_type":"localeString","en":"With comments","ru":"С комментариями"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"user":{"_type":"localeString","en":"User","ru":"Пользователь"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"ru":" Партнеры","_type":"localeString","en":"Partners"},"customers":{"en":"Customers","ru":"Покупатели","_type":"localeString"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"ru":"Производитель продукта","_type":"localeString","en":"Product vendor"},"implementation-date":{"_type":"localeString","en":"Deployment date","ru":"Дата внедрения"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"en":"Deal closed","ru":"Сделка закрыта","_type":"localeString"},"deal-in-progress":{"_type":"localeString","en":"Deal in progress","ru":"Сделка в процессе"},"deal-is-planned":{"en":"Deal is planned","ru":"Сделка планируется","_type":"localeString"},"finished":{"_type":"localeString","en":"Finished","ru":"Завершено"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"ru":"Планируется","_type":"localeString","en":"Planned"},"proof-of-concept":{"en":"Proof of concept","ru":"Пилотный проект","_type":"localeString"},"stopped":{"_type":"localeString","en":"Stopped","ru":"Остановлено"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"products":"success","filters":"success"},"sections":{"products-text-block":{"label":"catalog-products-text-block","body":{"en":[{"style":"normal","_key":"8bebcfb34955","markDefs":[],"children":[{"text":"The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.","_key":"8bebcfb349550","_type":"span","marks":[]}],"_type":"block"}],"ru":[{"markDefs":[],"children":[{"text":"Каталог продуктов ROI4CIO - это база данных программного обеспечения, оборудования и ИТ-услуг для бизнеса. С помощью фильтров, подбирайте ИТ-продукты по категории, поставщику или производителю, бизнес-задачам, проблемам, наличию ROI калькулятора или калькулятора цены. Находите подходящие решения для бизнеса, воспользовавшись нейросетевым поиском, основанным на результатах внедрения софта в других компаниях.","_key":"28241882db7a0","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"28241882db7a"}],"_type":"localeBlock"}}},"sectionsStatus":{"products-text-block":"success"},"pageMetaData":{"products":{"translatable_meta":[{"translations":{"ru":"Продукты","_type":"localeString","en":"Products"},"name":"og:title"},{"name":"description","translations":{"en":"Description","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI","_type":"localeString"}},{"name":"og:description","translations":{"_type":"localeString","en":"The best applications and it services for business. Choice by type of software, business tasks and problems. Calculation of the cost of licensed software, ROI","ru":"Лучшие приложения и it услуги для бизнеса. Выбор по видам программного обеспечения, бизнес-задачам и проблемам. Расчет стоимости лицензионного ПО, ROI"}},{"name":"keywords","translations":{"_type":"localeString","en":"keyword","ru":"каталог, программное обеспечение, софт, ит услуги"}},{"name":"title","translations":{"_type":"localeString","en":"Products","ru":"Продукты"}}],"title":{"_type":"localeString","en":"ROI4CIO: Products","ru":"ROI4CIO: Продукты"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"products":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"teramind-dlp":{"id":3900,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/teramind.jpg","logo":true,"scheme":false,"title":"Teramind DLP","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"teramind-dlp","companyTitle":"Teramind","companyTypes":["supplier","vendor"],"companyId":5574,"companyAlias":"teramind","description":"<b>Data Loss Prevention (DLP)</b> is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection techniques and contextual analysis to identify and categorize sensitive data and IP. Next, policies and rules are created for data usage scenarios. The system then monitors user actions; validates them against the DLP rules and takes appropriate action if and when a rule condition is triggered. Actions could include stopping the action, blocking the user, alerting an administrator, requesting management override and more.\r\n<b>Teramind Features:</b>\r\n<b><i>User activity monitoring:</i></b>\r\nMonitors all user activity including third-party vendors and privileged users for 12+ system objects like: website, application, keystroke, IM, email, network etc.\r\n<b><i>Powerful policy and rules engine:</i></b>\r\nTeramind comes with hundreds of pre-built rules, templates and data categories. Create your own rules with an intuitive, visual Policy & Rules editor.\r\n<b><i>Insider threat detection:</i></b>\r\nIntelligent user behavioral analysis combined with session recording & playback, real-time alerts, immutable logs etc. help identify insider threats before they become critical issues.\r\n<b><i>Content discovery and classification:</i></b>\r\nDiscover and identify sensitive information from structured and unstructured sources. Built-in classification templates for Personally Identifiable Information (PII), Personal Health Information (PHI), Personal Financial Information (PFI) etc. \r\n<b><i>Advanced OCR:</i></b>\r\n ‘On the fly’ content discovery with advanced OCR, natural language processing (NLP) and RegEx. Detect sensitive data inside images, applications and even videos preventing steganographic data exfiltration. \r\n<b><i>Clipboard monitoring:</i></b>\r\nTeramind’s Clipboard Monitoring and Interception feature allows you to protect sensitive data from being shared through the clipboard copy/paste operations. \r\n<b><i>Fingerprinting and tagging: </i></b>\r\nTeramind’s powerful fingerprinting and tagging features identify important documents and files and then monitors their usage so that you can keep track of your data even when modified or transferred.\r\n<b><i>Compliance management: </i></b>\r\nTeramind has built-in support for compliance and standards like GDPR, HIPAA, PCI DSS, ISO 27001 etc. and can be adapted to support other regulatory requirements with its powerful Policy & Rules editor and various monitoring and reporting capabilities.\r\n<b><i>Risk management: </i></b>\r\nIdentify high risk users, policies and system objects on the dedicated Risk Dashboard. Sophisticated risk scoring helps identify and focus on high risk areas.\r\n<b>Flexible Deployment Options </b>\r\n<b>On-premise</b> - control the Teramind implementation in its entirety, stay off-cloud if that’s your firm’s operational model, leverage LDAP groups and users to identify which users and groups to apply which policies and rules to.\r\n<b>Teramind Private Cloud</b> - use your own secure, scalable private cloud implementation including AWS, Google Cloud, Azure and more.\r\n<b>Teramind Cloud</b> - trust us the management of the Teramind deployment and infrastructure. Only install Teramind Agents on the machines you want to monitor and set up your users, policies and rules and let us take care of the rest.","shortDescription":"Effective Endpoint Data Loss Prevention Solutions","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Teramind DLP","keywords":"","description":"<b>Data Loss Prevention (DLP)</b> is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection ","og:title":"Teramind DLP","og:description":"<b>Data Loss Prevention (DLP)</b> is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/teramind.jpg"},"eventUrl":"","translationId":3899,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":824,"title":"ATP - Advanced Threat Protection","alias":"atp-advanced-threat-protection","description":" Advanced threat protection (ATP) refers to a category of security solutions that defend against sophisticated malware or hacking-based attacks targeting sensitive data. Advanced threat protection solutions can be available as software or as managed services. ATP solutions can differ in approaches and components, but most include some combination of endpoint agents, network devices, email gateways, malware protection systems, and a centralized management console to correlate alerts and manage defenses.\r\nThe primary benefit offered by advanced threat protection software is the ability to prevent, detect, and respond to new and sophisticated attacks that are designed to circumvent traditional security solutions such as antivirus, firewalls, and IPS/IDS. Attacks continue to become increasingly targeted, stealthy, and persistent, and ATP solutions take a proactive approach to security by identifying and eliminating advanced threats before data is compromised.\r\nAdvanced threat protection services build on this benefit by providing access to a global community of security professionals dedicated to monitoring, tracking, and sharing information about emerging and identified threats. ATP service providers typically have access to global threat information sharing networks, augmenting their own threat intelligence and analysis with information from third parties. When a new, advanced threat is detected, ATP service providers can update their defenses to ensure protection keeps up. This global community effort plays a substantial role in maintaining the security of enterprises around the world.\r\nEnterprises that implement advanced threat protection are better able to detect threats early and more quickly formulate a response to minimize damage and recover should an attack occur. A good security provider will focus on the lifecycle of an attack and manage threats in real-time. ATP providers notify the enterprise of attacks that have occurred, the severity of the attack, and the response that was initiated to stop the threat in its tracks or minimize data loss. Whether managed in-house or provided as a service, advanced threat protection solutions secure critical data and systems, no matter where the attack originates or how major the attack or potential attack is perceived.","materialsDescription":" <span style=\"font-weight: bold;\">How Advanced Threat Protection Works?</span>\r\nThere are three primary goals of advanced threat protection: early detection (detecting potential threats before they have the opportunity to access critical data or breach systems), adequate protection (the ability to defend against detected threats swiftly), and response (the ability to mitigate threats and respond to security incidents). To achieve these goals, advanced threat protection services and solutions must offer several components and functions for comprehensive ATP:\r\n<ul><li><span style=\"font-weight: bold;\">Real-time visibility</span> – Without continuous monitoring and real-time visibility, threats are often detected too late. When damage is already done, response can be tremendously costly in terms of both resource utilization and reputation damage.</li><li><span style=\"font-weight: bold;\">Context</span> – For true security effectiveness, threat alerts must contain context to allow security teams to effectively prioritize threats and organize response.</li><li><span style=\"font-weight: bold;\">Data awareness</span> – It’s impossible to determine threats truly capable of causing harm without first having a deep understanding of enterprise data, its sensitivity, value, and other factors that contribute to the formulation of an appropriate response.</li></ul>\r\nWhen a threat is detected, further analysis may be required. Security services offering ATP typically handle threat analysis, enabling enterprises to conduct business as usual while continuous monitoring, threat analysis, and response occurs behind the scenes. Threats are typically prioritized by potential damage and the classification or sensitivity of the data at risk. Advanced threat protection should address three key areas:\r\n<ul><li>Halting attacks in progress or mitigating threats before they breach systems</li><li>Disrupting activity in progress or countering actions that have already occurred as a result of a breach</li><li>Interrupting the lifecycle of the attack to ensure that the threat is unable to progress or proceed</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon-ATP.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"teramind-starter":{"id":5840,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/teramind.jpg","logo":true,"scheme":false,"title":"Teramind Starter","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"teramind-starter","companyTitle":"Teramind","companyTypes":["supplier","vendor"],"companyId":5574,"companyAlias":"teramind","description":"<p class=\"align-center\"><span style=\"font-weight: bold;\">Teramind Starter: Employee Monitoring Simplified</span></p>\r\n<p class=\"align-left\">Teramind Starter is Teramind’s entry-level employee monitoring solution. It’s built on top of Teramind’s award-winning UAM and DLP platform and includes powerful features such as real-time activity tracking, video capture and playback, and a set of productivity optimization tools. While it packs a punch in terms of functionality, it’s designed to be super affordable for the budget sensitive startups and small businesses looking for entry level employee monitoring, user session recording and process optimization capabilities.</p>\r\n<hr />\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Teramind Starter is a Feature-Rich Employee Monitoring Solution with Tangible Business Benefits<br />Monitor Employee Activity in Real-Time</span></p>\r\n<hr />\r\n<p class=\"align-left\">Employees spend majority of their time on desktop using apps or websites. Teramind Starter lets you visually records every action that a user makes on their desktop (screen), apps, websites, social media and instant messengers. Capture all the essential activity data like application/site name, URL, duration etc.- all from the industry's most powerful and user-friendly employee monitoring dashboard.</p>\r\n<p class=\"align-left\"> </p>\r\n<ul>\r\n<li><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Ensure Employee Privacy with Adjustable Tracking</span></span></li>\r\n</ul>\r\n<p class=\"align-left\">Each monitored object like screen/apps/websites etc. can be configured to take into consideration what needs to be monitored and measured and who has access to the monitored records. You can control who you want to monitor, how much you want to monitor, when and for how long. This allows for instant administrative control to respect employee privacy requirements.</p>\r\n<p class=\"align-left\"> </p>\r\n<ul>\r\n<li><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Detect Insider Threats with Intelligent Policy & Rules Engine</span></span></li>\r\n</ul>\r\n<p class=\"align-left\">Determine what behaviors are high risk i.e. downloading files and attachments from unknown website, running a risky application etc. Then, apply behavior-based rules to detect when users violate the rules. The system will automatically block harmful employee activity or warn the user with a customized message about potential danger reducing false positives with minimal supervision. The system can also notify you about sensitive rule violation incidents that needs your personal attention.</p>\r\n<p class=\"align-left\"> </p>\r\n<ul>\r\n<li><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Boost Employee Productivity and Increase Organizational Performance</span></span></li>\r\n</ul>\r\n<p class=\"align-left\">Use the workforce productivity tools to track active vs inactive time, late shifts, long breaks etc. Use intelligent activity-based rules to automatically identify clues to customer dissatisfaction (angry sentiments in social media posts/ customer query in instant messenger not answered etc.) and implement processes to provide better service.</p>\r\n<p class=\"align-left\"> </p>\r\n<ul>\r\n<li><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Monitor Privileged Users for Extra Security</span></span></li>\r\n</ul>\r\n<p class=\"align-left\">Teramind allows organizations to create profiles for remote and privileged employees and then define what information and system resources each profile can access. Create autonomous rules to notify the authorities of any suspicious privileged user activity, such as unscheduled login, access to system configuration, creation of backdoor accounts etc.</p>\r\n<p class=\"align-left\"> </p>\r\n<ul>\r\n<li><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Audit Security Incidents with Forensics</span></span></li>\r\n</ul>\r\n<p class=\"align-left\">Detailed alerts for all users can be viewed including any security event and what action was taken, which app/site was involved, what data got accessed etc. Session recordings and history playback can be used to view user’s desktop or exported as MP4 video to be used as evidence in any investigation. Immutable system logs and session reports provide with further information to trace back to the source and cause of any security incident.<br /><br /><br /></p>","shortDescription":"Employee Monitoring Software with Powerful Insider Threat Detection and Productivity Analysis Features\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Teramind Starter","keywords":"","description":"<p class=\"align-center\"><span style=\"font-weight: bold;\">Teramind Starter: Employee Monitoring Simplified</span></p>\r\n<p class=\"align-left\">Teramind Starter is Teramind’s entry-level employee monitoring solution. It’s built on top of Teramind&rsquo","og:title":"Teramind Starter","og:description":"<p class=\"align-center\"><span style=\"font-weight: bold;\">Teramind Starter: Employee Monitoring Simplified</span></p>\r\n<p class=\"align-left\">Teramind Starter is Teramind’s entry-level employee monitoring solution. It’s built on top of Teramind&rsquo","og:image":"https://old.roi4cio.com/fileadmin/user_upload/teramind.jpg"},"eventUrl":"","translationId":5841,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":111,"title":"Time Tracking Software"}],"testingArea":"","categories":[{"id":862,"title":"Time Tracking Software","alias":"time-tracking-software","description":"Any business owner knows that they have to keep track of their employees. Their hours must be documented for payroll and, naturally, you would like to know where they are.\r\nTime-tracking software is a category of computer software that allows its employees to record time spent on tasks or projects. The software is used in many industries, including those who employ freelancers and hourly workers. It is also used by professionals who bill their customers by the hour. These include lawyers, freelancers and accountants. The tool could be used as a stand-alone or be integrated with other applications like project management software, customer support and accounting to name just a few. Time tracking software is the electronic version of the traditional paper timesheet. Tracking time can increase productivity, as businesses can track time spent on tasks and get a better understanding of what practices causes their employees to waste time. Time tracking software enhances accountability by documenting the time it takes to finish given tasks. The data is collected in a database and could be used for data analysis by the human resources department. Features offered by time-tracking software include:\r\n<ul><li>Automatic generation of invoices to the professional's clients or customers based on the time spent.</li><li>Tracking of cost overruns for fixed cost projects.</li><li>Workforce management packages that track attendance, employee absences, human resource issues, payroll, talent management and labor analytics.</li></ul>","materialsDescription":"<span style=\"font-weight: bold;\">What are the types of time-tracking software?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Timesheet.</span></span> Allows users to manually enter time spent on tasks.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Time-tracking/recording.</span></span> Automatically records activities performed on a computer.\r\nTime-tracking software can be:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Standalone.</span></span> Used only to record timesheets and generate reports.\r\n<span style=\"font-style: italic;\">Integrated as part of:</span>\r\n<ul><li>Accounting systems, e.g. timesheet data fed directly to company accounts.</li><li>Billing systems, e.g. to generate invoices, especially for contractors, lawyers, etc.</li><li>Project management systems, e.g. timesheet data used by project management software to visualize the effort being spent on projects or tasks.</li><li>Payroll systems, e.g. to pay employees based on time worked.</li><li>Resource scheduling, e.g. bi-directional integration allows schedulers to schedule staff to tasks, which, once complete, can be confirmed and converted to timesheets.</li></ul>\r\n<span style=\"font-weight: bold;\">What is timesheet software?</span>\r\nTimesheet software is software used to maintain timesheets. It was popularized when computers were first introduced to the office environment with the goal of automating heavy paperwork needs for big organizations. Timesheet software allows documenting time spent performing different tasks.\r\nWhen used within companies, employees enter the time they've spent on tasks into electronic timesheets. These timesheets can then be approved or rejected by supervisors or project managers.\r\nSince 2006, timesheet software has been moving to mobile platforms (smartphones, tablets, smartwatches, etc.) enabling better tracking of employees whose work involves multiple locations.\r\n<span style=\"font-weight: bold;\">What is a time-tracking/recording software?</span>\r\nTime-tracking/recording software automates the time-tracking process by recording the activities performed on a computer and the time spent on each of them. This software is intended to be an improvement over timesheet software. Its goal is to offer a general picture of computer usage. Automatic time-tracking/recording software records and shows the usage of applications, documents, games, websites, etc.\r\nWhen used within companies, this software allows monitoring the productivity of employees by recording the tasks they perform on their computers. It can be used to help fill out timesheets.\r\nWhen used by freelancers, this software helps to create reports for clients (e.g. timesheets and invoices) or to prove work was done.\r\n<span style=\"font-weight: bold;\">What are the time-tracking methods?</span>\r\nThere are several ways companies track employee time using time tracking software.\r\n<span style=\"font-style: italic;\">Durational.</span> Employees enter the duration of the task but not the times when it was performed.<br /><span style=\"font-style: italic;\">Chronological.</span> Employees enter start and end times for the task.\r\n<span style=\"font-style: italic;\">Automatic.</span> The system automatically calculates time spent on tasks or whole projects, using a connected device or a personal computer and user input using start and stop buttons. Users can retrieve logged tasks and view the duration or the start and stop times.\r\n<span style=\"font-style: italic;\">Exception-based.</span> The system automatically records standard working hours except for approved time off or LOA.\r\n<span style=\"font-style: italic;\">Clock-in clock-out.</span> Employees manually record arrival and departure times.\r\n<span style=\"font-style: italic;\">Monitoring.</span> The system records the active and idle time of employees. It might also record screen captures.<br /><span style=\"font-style: italic;\">Location-based.</span> The system determines the working status of employees based on their location.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/time.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},"teramind-uam":{"id":6326,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/teramind.jpg","logo":true,"scheme":false,"title":"Teramind UAM","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"teramind-uam","companyTitle":"Teramind","companyTypes":["supplier","vendor"],"companyId":5574,"companyAlias":"teramind","description":"<span style=\"font-weight: bold;\">Prevent Insider Threats with User Activity Monitoring and Behavioral Analytics</span>\r\nMost organizations have cybersecurity measures in place including antivirus, firewall, intrusion detection to protect infrastructure and IT assets. While these are generally good at defending the organization from external threats, they leave a security hole when it comes to employees and other internal users, third-party vendors, contractors and privileged administrators who already have access to an organization’s valuable assets and sensitive data.\r\nWhether it is a company’s intellectual property, financial records, customer data, PII, PHI or other sensitive material, it only takes one insider to engage in unwanted behavior and expose an organization to risks. In fact, the majority of the data breaches in recent years involved weak or exploited employee credentials either by a malicious or accidental incident. This is where User Activity Monitoring (UAM) can help fill the gaps which already include features like Employee Monitoring, Privileged User Monitoring, Third-Party Monitoring, User and Entity Behavior Analytics (UEBA) and Endpoint Security, that is crucial for a holistic insider threat prevention solution.\r\n<span style=\"font-weight: bold;\">User activity monitoring</span> is the process of tracking all user activity and behavior, while they are logged into a computer (endpoint). With an employee monitoring solution in place, businesses have the necessary means to keep an eye on their sensitive data, employees and third-party entities so that they can identify and stop the misuse of company data and resources.\r\n<span style=\"font-weight: bold;\">Teramind UAM Combines User Activity Monitoring, Behavior Analytics and Productivity Tools in a Single Platform</span>\r\nTeramind user activity monitoring goes beyond the basic employee monitoring and tracking functionality and adds intelligent behavior-based analysis to provide actionable insight and automated responses to employee-generated threats. It can monitor employees, third-party vendors, contractors, remote and special/privileged users. With its rules and policies, Teramind UAM captures violation incidents as forensic evidence and takes action to alert, stop, block and more.\r\nTeramind UAM can also measure employee productivity, conduct risk analysis, prevent unauthorized data exfiltration and keep track of how employees and third-party vendors access company resources while logged in at work. Finally, in case of a data breach or security incident, Teramind provides comprehensive forensic data and session recordings to identify the employees and vendors who have triggered a rule violation along with their activity footprint with pinpoint accuracy.\r\n<b>Teramind UAM Features:</b>\r\n<ul> <li>Real-Time User Activity Monitoring</li> <li>User Behavior Analytics</li> <li>Policy and Rules Engine</li> <li>Built-In Productivity Optimization</li> <li>Audit and Forensics</li> <li>Third-Party Vendor Management</li> <li>Compliance Management</li> </ul>","shortDescription":"Activity Monitoring, User Behavior Analytics, Productivity Optimization & Insider Threat Detection in a Single Platform.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Teramind UAM","keywords":"","description":"<span style=\"font-weight: bold;\">Prevent Insider Threats with User Activity Monitoring and Behavioral Analytics</span>\r\nMost organizations have cybersecurity measures in place including antivirus, firewall, intrusion detection to protect infrastructure and IT ","og:title":"Teramind UAM","og:description":"<span style=\"font-weight: bold;\">Prevent Insider Threats with User Activity Monitoring and Behavioral Analytics</span>\r\nMost organizations have cybersecurity measures in place including antivirus, firewall, intrusion detection to protect infrastructure and IT ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/teramind.jpg"},"eventUrl":"","translationId":6326,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":140,"title":"UAM - User Activity Monitoring"}],"testingArea":"","categories":[{"id":882,"title":"User Activity Monitoring","alias":"user-activity-monitoring","description":"User activity monitoring (UAM) solutions are software tools that track and monitor end-user behavior on devices, networks and other company-owned IT resources. Many organizations implement UAM tools to help, detect and stop insider threats, whether they unintentional or done with malicious intent. The range of monitoring and methods utilized depends on the objectives of the company.\r\nBy implementing user activity monitoring, enterprises can more readily identify suspicious behavior and mitigate risks before they result in data breaches, or at least in time to minimize damages. Sometimes called user activity tracking, user activity monitoring is a form of surveillance, but serves as a proactive review of end-user activity to determine misuse of access privileges or nonadherence with data protection policies either through ignorance or malicious intent.\r\nThe purpose of user activity monitoring is to protect information while ensuring availability and compliance with data privacy and security regulations. UAM goes beyond simply monitoring network activity. Instead, it can monitor all types of user activity, including all system, data, application, and network actions that users take, such as their web browsing activity, whether users are accessing unauthorized or sensitive files and more.\r\nThere are a variety of tools that can be used to aid in or support user activity monitoring. These tools range from general security software applications to targeted tools designed to track sessions and activity, creating a complete audit trail for every user. There are also tools known as privileged account security solutions, which aim to monitor and secure privileged account activity and centralize the management of policies.\r\nThe best user activity monitoring tools include real-time alerting systems. These tools monitor user activity in the background in real-time and notify IT and security teams the moment suspicious activity occurs. Without the real-time element, risks may go unnoticed while your IT department addresses other known issues. Thanks to today’s technology, it’s not necessary to have entire IT teams dedicated to live-monitoring user activity; a good security solution that supports user activity monitoring can do most of the heavy lifting.\r\nUser activity monitoring is an important line of defense against data breaches and other cybersecurity compromises. Many IT security teams lack visibility into how their users are accessing and utilizing sensitive data, leaving them susceptible to insider threats or outside attackers who have gained access to their systems. UAM is an important component of data protection for enterprises today. While there are dedicated “point solutions” for monitoring user behavior, organizations should look to data protection tools that can combine user activity monitoring features with data discovery and classification, policy-based controls and advanced reporting capabilities.","materialsDescription":"<span style=\"font-weight: bold; \">What does User Activity Monitoring mean?</span>\r\nUser Activity Monitoring (UAM) solutions are software tools that essentially track, monitor and alert on the activity and overall behavior of your users. The most common application of user activity monitoring tools is in the detection and prevention of insider threats.\r\nThe simple fact is that your users are the most likely source of a data breach in your organization (whether through negligence or malice) so they must be monitored.\r\nThrough the implementation of user activity monitoring solutions, enterprises can reduce the amount of time it takes to identify anomalous user behavior and take reparative action.\r\n<span style=\"font-weight: bold; \">How does User Activity Monitoring work?</span>\r\nThe purpose of user activity monitoring is to protect information while ensuring availability and compliance with data privacy and security regulations. UAM goes beyond simply monitoring network activity. Instead, it can monitor all types of user activity, including all system, data, application and network actions that users take, such as their web browsing activity, whether users are accessing unauthorized or sensitive files and more.<br />There are various methods implemented to monitor and manage user activity such as:\r\n<ul><li>Video recordings of sessions</li><li>Log collection and analysis</li><li>Network packet inspection</li><li>Keystroke logging</li><li>Kernel monitoring</li><li>File/screenshot capturing</li></ul>\r\nAll of the information gathered must be looked at within the boundaries of company policy and the user role to figure out if inappropriate activity is in play. What constitutes “inappropriate user activity” is up to the company deploying the UAM solution, and can include anything from visiting personal sites or shopping during work hours to theft of sensitive company data such as intellectual property or financial information.\r\n<span style=\"font-weight: bold;\">What are the Benefits of User Activity Monitoring?</span>\r\nAny level of monitoring can accumulate large amounts of data. The goal of any user activity monitoring program should be to find and filter out actionable information that’s valuable in data protection efforts. With effective processes in place, you can immediately detect and investigate suspicious user activity. You can also find out if users are uploading sensitive data to public clouds, utilizing non-approved services and applications or engaging in any other type of risky activity while using the company network or resources. User activity monitoring tools are also helpful in ensuring that employees do not take any of your company's confidential information when they are leaving the company.\r\nIn order to make the data collected by user activity monitoring solutions as useful as possible, that data must be analyzed for several items, including:\r\n<ul><li>Associated risk</li><li>Defined policies</li><li>Time of day</li><li>Identity context</li></ul>\r\nIt also helps to have real-time identification along with detailed reporting of historical activity. Questions to answer are: Who did what, when and where? User activity monitoring helps to identify abuse to help reduce the risk of inappropriate actions that can lead to malware infections or data breaches. It also helps to decrease the cost of compliance, while offering intelligence needed to improve security measures.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/monitoing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}},"aliases":{"1":["teramind-dlp","teramind-starter","teramind-uam"]},"links":{"first":"http://apis.roi4cio.com/api/products?page=1","last":"http://apis.roi4cio.com/api/products?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://apis.roi4cio.com/api/products","per_page":20,"to":3,"total":3},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[5574],"values":{"5574":{"id":5574,"title":"Teramind"}}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"111":{"id":111,"title":"Time Tracking Software"},"140":{"id":140,"title":"UAM - User Activity Monitoring"}},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}