{"global":{"lastError":{},"locale":"de","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"products-popover":{"de":"die produkte","ru":"Продукты","_type":"localeString","en":"Products"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"en":"partners","ru":"партнеры","_type":"localeString"},"update-profile-button":{"en":"Update profile","ru":"Обновить профиль","_type":"localeString"},"read-more-button":{"en":"Show more","ru":"Показать ещё","_type":"localeString"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"_type":"localeString","en":"Categories","ru":"Компетенции"},"description":{"en":"Description","ru":"Описание","_type":"localeString"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 reference"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"ru":"Страна","_type":"localeString","en":"Country"},"partner-types":{"_type":"localeString","en":"Partner types","ru":"Типы партнеров"},"branch-popover":{"ru":"область деятельности","_type":"localeString","en":"branch"},"employees-popover":{"en":"number of employees","ru":"количество сотрудников","_type":"localeString"},"partnership-programme":{"ru":"Партнерская программа","_type":"localeString","en":"Partnership program"},"partner-discounts":{"_type":"localeString","en":"Partner discounts","ru":"Партнерские скидки"},"registered-discounts":{"_type":"localeString","en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"_type":"localeString","en":"Partner level requirements","ru":"Требования к уровню партнера"},"certifications":{"en":"Certification of technical specialists","ru":"Сертификация технических специалистов","_type":"localeString"},"sales-plan":{"ru":"Годовой план продаж","_type":"localeString","en":"Annual Sales Plan"},"partners-vendors":{"ru":"Партнеры-производители","_type":"localeString","en":"Partners-vendors"},"partners-suppliers":{"_type":"localeString","en":"Partners-suppliers","ru":"Партнеры-поставщики"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"_type":"localeString","en":"Supplied products","ru":"Поставляемые продукты"},"vendored-products":{"ru":"Производимые продукты","_type":"localeString","en":"Produced products"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"_type":"localeString","en":"Supplied deployments","ru":"Поставляемые внедрения"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"register":{"en":"Register","ru":"Регистрация ","_type":"localeString"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"ru":"Презентация компании","_type":"localeString","en":"Company presentation"}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"_type":"localeString","en":"Sign out","ru":"Выйти"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"_type":"localeString","en":"Blog","ru":"Блог"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"en":"My profile","ru":"Мои данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"_type":"localeString","en":"4 vendors","ru":"поставщикам"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"_type":"localeString","en":"Leave comment","ru":"Оставить комментарий"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"_type":"localeString","en":"Company name","ru":"Компания"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"translatable_meta":[{"name":"title","translations":{"_type":"localeString","en":"Company","ru":"Компания"}},{"translations":{"ru":"Описание компании","_type":"localeString","en":"Company description"},"name":"description"},{"name":"keywords","translations":{"ru":"Ключевые слова для компании","_type":"localeString","en":"Company keywords"}}],"title":{"_type":"localeString","en":"ROI4CIO: Company","ru":"ROI4CIO: Компания"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"pearland-independent-school-district":{"id":8885,"title":"Pearland Independent School District","logoURL":"https://old.roi4cio.com/uploads/roi/company/Pearland_district.png","alias":"pearland-independent-school-district","address":"Pearland, Texas USA","roles":[{"id":1,"type":"user"}],"description":" Pearland Independent School District is a school district based in Pearland, Texas, United States.<br />Pearland ISD serves most of the city of Pearland, the city of Brookside Village, and unincorporated areas in Brazoria County (including Silverlake).<br />Each house or residential area in Pearland is zoned to an elementary school (grades PK-4), a middle school (5-6), a junior high school (7-8), and one of the two high schools (9-12).<br />Pearland Independent School District was established in 1937. The original high school building and elementary campus still stand on Grand Boulevard in the heart of Pearland. <br />Source: https://en.wikipedia.org/wiki/Pearland_Independent_School_District","companyTypes":["user"],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[{"id":1214,"title":"Ivanti Application Control for Pearland Independent School District","description":"<span style=\"font-weight: bold;\">About Pearland Independent School District</span>\r\nPearland Independent School District (ISD) is based in Pearland, Texas. Pearland ISD serves most of the city of Pearland, the city of Brookside Village, and unincorporated areas in Brazoria County including Silverlake, a planned community. More than 25,000 Pearland ISD teachers and students access curriculum and applications via virtual desktop infrastructure (VDI).\r\n<span style=\"font-weight: bold;\">The Challenge</span>\r\nThough it doesn’t get as much attention as hackers targeting the Department of Defense, large financial institutions, or the nation’s utility grid, cyber crime plagues the networks of educational institutions from coast to coast. Just Google something like “students steal personal information from school networks” and you’ll get more than 29M results.\r\nGreg Bartay, IT director for Pearland ISD, can vouch for the seriousness of this problem firsthand. <span style=\"font-style: italic;\">“We had a student who brought malicious tools into the district and executed them from a flash drive,” explains Bartay. “He downloaded Active Directory tools at home. He also downloaded UltraSurf, which creates a virtual tunnel through your firewall from the inside out. He was trying to break into student accounts.”</span>\r\n<span style=\"font-style: italic;\">“He was posting the information he retrieved online,”</span> Bartay continues. <span style=\"font-style: italic;\">“We received anonymous emails from Internet share groups telling us what he was doing. With more time, he could have gotten access to things like students’ and parents’ Social Security numbers. ”</span> To combat this threat and avoid future problems, Bartay began looking for a technology solution that the district could use to protect the personal information of students, teachers, and staff.\r\nOne week after the hack, Pearland was hit with a ransomware attack. <span style=\"font-style: italic;\">“The attack was due to a file generated from a flash drive used on a school computer,”</span> said Jonathan Block, desktop support services manager for Pearland ISD. <span style=\"font-style: italic;\">“There were 15-20 file shares affected. It took us five hours to recover the data from backup. And, because we had to take down those file shares to recover data, we were unable to back up a day’s worth of teachers’ and students’ classwork.”</span>\r\n<span style=\"font-style: italic;\">“We thought we were protected against ransomware,”</span> continued Block.<span style=\"font-style: italic;\"> “But we discovered that Microsoft System Center Endpoint Protection had no zero-day definitions for the variant that attacked us.”</span>\r\nThe one-two punch of a hack closely followed by a ransomware attack created an enormous sense of urgency for the Pearland ISD IT team to find a solution.\r\n<span style=\"font-weight: bold;\">The Solution: Ivanti Application Manager</span>\r\nOther than locking down the network, which made day-to-day educational tasks nearly impossible, the district had few choices for protecting its sensitive information. <span style=\"font-style: italic;\">“We knew that trying to address the problem via Active Directory would take a lot of time and expertise,”</span> recalls George Thornton, vice president of engineering for Pearland’s technology partner Logical Front. <span style=\"font-style: italic;\">“Then a representative from Ivanti explained what Application Manager could do. So we set up a proof of concept study.”</span>\r\nThe POC ran for two months and Application Manager performed as promised, preventing any unauthorized executable from running within the network. <span style=\"font-style: italic;\">“It did everything we were told it would do,” notes Bartay. “It gives us control over what anyone can execute out of their home folders or off a USB drive. If someone wants to run a program that’s not on our list, they have to ask permission. It’s prevented kids and even many of our staff from using Pearland ISD endpoints for non-school-related activities.”</span>\r\n<span style=\"font-style: italic;\">“It took just ten minutes to deploy a simple Application Manager configuration to 38 machines in one of our high school libraries as a test,” said Block. “The team spent several hours observing a sucession of students try to play games on those library computers using flash drives they brought from home. Application Manager blocked every attempt.”</span>\r\n<span style=\"font-weight: bold;\">The Results</span>\r\nSince installing Application Manager, Bartay and his team have significantly reduced their risk. In addition, as the team observed in the school library, Application Manager has allowed the IT team to block students from executing online games without diving in to granular Active Directory policies. This saved the IT team time and also put a stop to activities that were robbing students of instructional time. <span style=\"font-style: italic;\">“When they are losing instructional time, it means they are not doing what they are here to do,”</span> Bartay points out.<br />\r\nIn addition to saving time on AD policies, implementing Application Manager also saves the IT team hundreds of hours each school year resetting all the student passwords due to malware or ransomware issues.<br />\r\nOrganizations used to stress perimeter security with strong firewalls and robust access policies. Today, that’s not enough. <span style=\"font-style: italic;\">“You can’t put a price on security. You’re talking about people’s lives. Just ask the people that shopped at Target. People will be cleaning that up for years to come,”</span> concludes Bartay.<br /><span style=\"font-style: italic;\">“You have to have a zero trust policy, with virtual firewalls throughout your network and layered defenses. Ivanti helps achieve that.”</span>","alias":"ivanti-application-control-for-pearland-independent-school-district","roi":0,"seo":{"title":"Ivanti Application Control for Pearland Independent School District","keywords":"","description":"<span style=\"font-weight: bold;\">About Pearland Independent School District</span>\r\nPearland Independent School District (ISD) is based in Pearland, Texas. Pearland ISD serves most of the city of Pearland, the city of Brookside Village, and unincorporated area","og:title":"Ivanti Application Control for Pearland Independent School District","og:description":"<span style=\"font-weight: bold;\">About Pearland Independent School District</span>\r\nPearland Independent School District (ISD) is based in Pearland, Texas. Pearland ISD serves most of the city of Pearland, the city of Brookside Village, and unincorporated area"},"deal_info":"","user":{"id":8885,"title":"Pearland Independent School District","logoURL":"https://old.roi4cio.com/uploads/roi/company/Pearland_district.png","alias":"pearland-independent-school-district","address":"Pearland, Texas USA","roles":[],"description":" Pearland Independent School District is a school district based in Pearland, Texas, United States.<br />Pearland ISD serves most of the city of Pearland, the city of Brookside Village, and unincorporated areas in Brazoria County (including Silverlake).<br />Each house or residential area in Pearland is zoned to an elementary school (grades PK-4), a middle school (5-6), a junior high school (7-8), and one of the two high schools (9-12).<br />Pearland Independent School District was established in 1937. The original high school building and elementary campus still stand on Grand Boulevard in the heart of Pearland. <br />Source: https://en.wikipedia.org/wiki/Pearland_Independent_School_District","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.pearlandisd.org/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Pearland Independent School District","keywords":"","description":" Pearland Independent School District is a school district based in Pearland, Texas, United States.<br />Pearland ISD serves most of the city of Pearland, the city of Brookside Village, and unincorporated areas in Brazoria County (including Silverlake).<br />E","og:title":"Pearland Independent School District","og:description":" Pearland Independent School District is a school district based in Pearland, Texas, United States.<br />Pearland ISD serves most of the city of Pearland, the city of Brookside Village, and unincorporated areas in Brazoria County (including Silverlake).<br />E","og:image":"https://old.roi4cio.com/uploads/roi/company/Pearland_district.png"},"eventUrl":""},"supplier":{"id":3047,"title":"Ivanti (LANDESK)","logoURL":"https://old.roi4cio.com/uploads/roi/company/ivanti-logo-01.png","alias":"ivanti-landesk","address":"","roles":[],"description":"<span lang=\"en\" class=\"VIiyi\"><span class=\"JLqJ4b\">Ivanti (formerly LANDesk Software) is a developer of systems, security and process management software solutions. It is one of the oldest companies providing such developments. The company was founded in 1985 under the name LAN Systems, in 1991 acquired by Intel, becoming its Intel LANDesk division. In 2002, LANDesk Software became a standalone company headquartered in Salt Lake City, Utah. In 2006 acquired by Avocent. In 2017, LANDesk and Heat Software merged and re-branded the company as Ivanti. Today over 1,700 people work here. Ivanti's customers include 78 Fortune 100 companies. IT departments use Ivanti solutions for technical support (ITSM), IT asset management (ITAM), endpoint and supply chain management.</span></span> ","companyTypes":[],"products":{},"vendoredProductsCount":18,"suppliedProductsCount":18,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":6,"vendorImplementationsCount":11,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"https://www.ivanti.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Ivanti (LANDESK)","keywords":"LANDESK, management, mobile, solutions, users, more, devices, provider","description":"<span lang=\"en\" class=\"VIiyi\"><span class=\"JLqJ4b\">Ivanti (formerly LANDesk Software) is a developer of systems, security and process management software solutions. It is one of the oldest companies providing such developments. The company was founded in 1985 ","og:title":"Ivanti (LANDESK)","og:description":"<span lang=\"en\" class=\"VIiyi\"><span class=\"JLqJ4b\">Ivanti (formerly LANDesk Software) is a developer of systems, security and process management software solutions. It is one of the oldest companies providing such developments. The company was founded in 1985 ","og:image":"https://old.roi4cio.com/uploads/roi/company/ivanti-logo-01.png"},"eventUrl":""},"vendors":[{"id":3047,"title":"Ivanti (LANDESK)","logoURL":"https://old.roi4cio.com/uploads/roi/company/ivanti-logo-01.png","alias":"ivanti-landesk","address":"","roles":[],"description":"<span lang=\"en\" class=\"VIiyi\"><span class=\"JLqJ4b\">Ivanti (formerly LANDesk Software) is a developer of systems, security and process management software solutions. It is one of the oldest companies providing such developments. The company was founded in 1985 under the name LAN Systems, in 1991 acquired by Intel, becoming its Intel LANDesk division. In 2002, LANDesk Software became a standalone company headquartered in Salt Lake City, Utah. In 2006 acquired by Avocent. In 2017, LANDesk and Heat Software merged and re-branded the company as Ivanti. Today over 1,700 people work here. Ivanti's customers include 78 Fortune 100 companies. IT departments use Ivanti solutions for technical support (ITSM), IT asset management (ITAM), endpoint and supply chain management.</span></span> ","companyTypes":[],"products":{},"vendoredProductsCount":18,"suppliedProductsCount":18,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":6,"vendorImplementationsCount":11,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"https://www.ivanti.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Ivanti (LANDESK)","keywords":"LANDESK, management, mobile, solutions, users, more, devices, provider","description":"<span lang=\"en\" class=\"VIiyi\"><span class=\"JLqJ4b\">Ivanti (formerly LANDesk Software) is a developer of systems, security and process management software solutions. It is one of the oldest companies providing such developments. The company was founded in 1985 ","og:title":"Ivanti (LANDESK)","og:description":"<span lang=\"en\" class=\"VIiyi\"><span class=\"JLqJ4b\">Ivanti (formerly LANDesk Software) is a developer of systems, security and process management software solutions. It is one of the oldest companies providing such developments. The company was founded in 1985 ","og:image":"https://old.roi4cio.com/uploads/roi/company/ivanti-logo-01.png"},"eventUrl":""}],"products":[{"id":6175,"logo":false,"scheme":false,"title":"Ivanti Application Control","vendorVerified":1,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"alias":"ivanti-application-control","companyTypes":[],"description":"Ivanti® Application Control offers IT unprecedented control over endpoints, reducing security risk while providing a great user experience in the latest Windows environments. In addition to contextual application control, the solution delivers secure Windows privilege management that lets you remove users’ full admin rights and prevents unauthorized executables such as malware, ransomware, unlicensed software, and other unknown applications from being installed or executed. Application Control 10.1 also enables your IT team to manage application access and user privileges efficiently across your desktop and server estate.\r\n<span style=\"font-weight: bold;\">Full Support for Windows Server 2016 and extended support for Windows 10</span><br />\r\nApplication Control 10.1 delivers full support for Windows Server 2016 and extended support for Windows 10, expanding its ability to stop ransomware and malware. This latest version also provides IT admins with enhanced, granular end user controls to improve end user personalization and endpoint security.<br />\r\n<span style=\"font-weight: bold;\">Trusted Ownership™</span><br />\r\nApplication Control uses Trusted Ownership, checking for out-of-the-box endpoint security. It relies on examining the NTFS owner of an application. If an application is introduced, and hence owned, by a non-trusted owner, e.g. a standard user, the application is prevented instantly from running.<br />\r\nHowever, if an application is introduced and owned by a ‘Trusted Owner’, e.g. an administrator or a software deployment system such as Microsoft SCCM, then every user can run the application, unless otherwise stated. This alleviates IT of the ongoing burden of maintaining whitelists associated with other application control solutions, when application or operating system content requires patching.<br />\r\n<span style=\"font-weight: bold;\">Digital Signatures</span><br />\r\nYou can assign SHA-1, SHA-256, or ADLER32 digital signatures to applications and files to ensure application integrity and to prevent modified or spoofed applications from executing.<br />\r\n<span style=\"font-weight: bold;\">Whitelisting and Blacklisting</span><br />\r\nIT can use whitelist and blacklist configurations in conjunction with Trusted Ownership to control known applications that pass the NTFS owner check. Applications that users should not have access to, such as administratorowned tools like cmd.exe or ftp.exe, are denied automatically. Or, whitelists can be created to guarantee that only known and trusted applications can execute on a system.<br />\r\n<span style=\"font-weight: bold;\">Windows Privilege Management</span><br />\r\nProviding users with full admin rights can leave endpoints vulnerable, significantly increasing security and manageability costs, decreasing productivity, creating legal and liability issues, and making compliance difficult. By removing users’ full admin rights and providing them with elevated privileges for just the apps or tasks they need, you can simplify endpoint security, reduce support calls, and lower TCO.<br />\r\n<span style=\"font-weight: bold;\">On-Demand Change Requests</span><br />\r\nMobile users or users who spend time working offline may need to access unapproved applications. Preventing access to these applications slows productivity and leads to a poor user experience. On-Demand Change Requests enables end users to request emergency privilege elevation or application access when productivity is affected by the unavailability of applications.<br />\r\n<span style=\"font-weight: bold;\">URL Redirection</span><br />\r\nIf a user leaves a web browser open on a specific web page or application and then reconnects from a new device or location, the browser can be redirected to a predefined, safe address.<br />\r\n<span style=\"font-weight: bold;\">Application Archiving</span><br />\r\nAutomatically copies prohibited files that users have attempted to run and stores them in a secure repository for secured analysis.<br />\r\n<span style=\"font-weight: bold;\">License Management</span><br />Application Control is recognized by Microsoft for enforcing device-based software license control. By controlling which users or devices have permission to run named applications, limits can be placed on the number of application instances, which devices or users can run the application, when users can run a program, and for how long.","shortDescription":"Application Control: Increase endpoint security and reduce IT workload and cost","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Ivanti Application Control","keywords":"","description":"Ivanti® Application Control offers IT unprecedented control over endpoints, reducing security risk while providing a great user experience in the latest Windows environments. In addition to contextual application control, the solution delivers secure Windows p","og:title":"Ivanti Application Control","og:description":"Ivanti® Application Control offers IT unprecedented control over endpoints, reducing security risk while providing a great user experience in the latest Windows environments. In addition to contextual application control, the solution delivers secure Windows p"},"eventUrl":"","translationId":6176,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"<span style=\"font-weight: bold; \">Identity management</span> (IdM), also known as <span style=\"font-weight: bold; \">identity and access management</span> (IAM or IdAM), is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of IT security and Data Management.\r\nWith an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Identity and access management software offers role-based access control, which lets system administrators regulate access to systems or networks based on the roles of individual users within the enterprise. In this context, access is the ability of an individual user to perform a specific task, such as view, create or modify a file. Roles are defined according to job competency, authority and responsibility within the enterprise.\r\nSystems used for identity and access management include single sign-on systems, multi-factor authentication and privileged access management (PAM). These technologies also provide the ability to securely store identity and profile data as well as data governance functions to ensure that only data that is necessary and relevant is shared. IAM systems can be deployed on premises, provided by a third-party vendor through a cloud-based subscription model or deployed in a hybrid cloud.\r\n<span style=\"font-weight: bold; \">Basic components of IAM.</span> On a fundamental level, IAM encompasses the following components:\r\n<ul><li>How individuals are identified in a system.</li><li>How roles are identified in a system and how they are assigned to individuals.</li><li>Adding, removing and updating individuals and their roles in a system.</li><li>Assigning levels of access to individuals or groups of individuals.</li><li>Protecting the sensitive data within the system and securing the system itself.</li></ul>\r\nAccess identity management system should consist of all the necessary controls and tools to capture and record user login information, manage the enterprise database of user identities and orchestrate the assignment and removal of access privileges. That means that systems used for IAM should provide a centralized directory service with oversight as well as visibility into all aspects of the company user base.\r\nTechnologies for identity access and management should simplify the user provisioning and account setup process. User access management software should reduce the time it takes to complete these processes with a controlled workflow that decreases errors as well as the potential for abuse while allowing automated account fulfillment. An identity and access management system should also allow administrators to instantly view and change access rights.\r\nIAM systems should be used to provide flexibility to establish groups with specific privileges for specific roles so that access rights based on employee job functions can be uniformly assigned. Identity access management software should also provide request and approval processes for modifying privileges because employees with the same title and job location may need customized, or slightly different, access.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between identity and access management?</span></h1>\r\nAfter authentication, there needs to be an access control decision. The decision is based on the information available about the user. The difference between identity management and access management is thus:\r\n<ul><li>Identity Management is about managing the attributes related to the user.</li><li>Access Management is about evaluating the attributes based on policies and making Yes/No decisions.</li></ul>\r\nThere are three types of Access Control Systems: \r\n<ul><li>Discretionary Access Control (DAC)</li><li>Mandatory Access Control (MAC)</li><li>Role-Based Access Control (RBAC)</li></ul>\r\n<h1 class=\"align-center\">What are the main benefits of identity management?</h1>\r\nIdentity access and management are useful in many ways: it ensures regulatory compliance, enables cost savings, and simplifies the lives of your customers by enhancing their experience. These are the main benefits of having an IAM solution:\r\n<ul><li><span style=\"font-weight: bold; \">Easily accessible anywhere</span></li></ul>\r\nNowadays, people need their identities all the time to use services and resources. In that sense, they require access to any platform without limits using their IDs, thus eliminating barriers for customers to enter the platform anytime, anywhere.\r\n<ul><li><span style=\"font-weight: bold; \">It encourages the connection between the different parts</span></li></ul>\r\nThe digital transformation that is taking place among more and more organizations forces the need for people, applications and devices to stay connected to each other. And, as expected, all of these processes bring with them some security threats.\r\nHowever, IAM software is a solution that guarantees correct administration with the best identity providers, such as Salesforce, Twitter and Google. Authentication and security are two of the strengths of Identity and Access Management, as well as being extendable and ready for future advances. \r\n<ul><li><span style=\"font-weight: bold; \">It improves productivity</span></li></ul>\r\nIdentity software automates the entry of new personnel and facilitates access to all components of the system with which the company operates. This allows reducing times in the delivery of access so that they begin to produce immediately. For this reason, business agility is also increased by using the advantages that technology makes available to meet the demands of today’s world. \r\n<ul><li><span style=\"font-weight: bold; \">It optimizes user experience</span></li></ul>\r\nRemembering so many usernames and passwords to access social networks, banks and other services on the Internet becomes a challenge for people. Thanks to user identity management system, people can get an identity that provides access to different systems. Single sign-on (SSO) allows customers and partners to access different internal and external applications with the same access method. That way the user experience will not be affected.\r\n<ul><li><span style=\"font-weight: bold; \">Secure your brand at all levels</span></li></ul>\r\nThere will be no risk of security breach, regardless of whether a connection is made from multiple identity providers. Identity management software and access management software enables strong authentication to keep your business and brand secure. Detailed verification of all identities entering the system is performed, in addition to allowing various licenses to limit access levels. At the same time, it monitors through analysis, fraud detection and alert functions that indicate a possible real risk. In short, enterprise identity management system is a reliable tool that employs technology to support digital transformation. A software that provides agility, security and satisfaction to the company’s customers. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IAM.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":10,"title":"Ensure Compliance"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unauthorized access to corporate IT systems and data"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":338,"title":"Employee personal use of corporate IT during working hours"},{"id":348,"title":"No centralized control over IT systems"},{"id":356,"title":"High costs of routine operations"},{"id":371,"title":"No control over the state of communication channels"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":387,"title":"Non-compliant with IT security requirements"},{"id":397,"title":"Insufficient risk management"}]}},"categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"<span style=\"font-weight: bold; \">Identity management</span> (IdM), also known as <span style=\"font-weight: bold; \">identity and access management</span> (IAM or IdAM), is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of IT security and Data Management.\r\nWith an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Identity and access management software offers role-based access control, which lets system administrators regulate access to systems or networks based on the roles of individual users within the enterprise. In this context, access is the ability of an individual user to perform a specific task, such as view, create or modify a file. Roles are defined according to job competency, authority and responsibility within the enterprise.\r\nSystems used for identity and access management include single sign-on systems, multi-factor authentication and privileged access management (PAM). These technologies also provide the ability to securely store identity and profile data as well as data governance functions to ensure that only data that is necessary and relevant is shared. IAM systems can be deployed on premises, provided by a third-party vendor through a cloud-based subscription model or deployed in a hybrid cloud.\r\n<span style=\"font-weight: bold; \">Basic components of IAM.</span> On a fundamental level, IAM encompasses the following components:\r\n<ul><li>How individuals are identified in a system.</li><li>How roles are identified in a system and how they are assigned to individuals.</li><li>Adding, removing and updating individuals and their roles in a system.</li><li>Assigning levels of access to individuals or groups of individuals.</li><li>Protecting the sensitive data within the system and securing the system itself.</li></ul>\r\nAccess identity management system should consist of all the necessary controls and tools to capture and record user login information, manage the enterprise database of user identities and orchestrate the assignment and removal of access privileges. That means that systems used for IAM should provide a centralized directory service with oversight as well as visibility into all aspects of the company user base.\r\nTechnologies for identity access and management should simplify the user provisioning and account setup process. User access management software should reduce the time it takes to complete these processes with a controlled workflow that decreases errors as well as the potential for abuse while allowing automated account fulfillment. An identity and access management system should also allow administrators to instantly view and change access rights.\r\nIAM systems should be used to provide flexibility to establish groups with specific privileges for specific roles so that access rights based on employee job functions can be uniformly assigned. Identity access management software should also provide request and approval processes for modifying privileges because employees with the same title and job location may need customized, or slightly different, access.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between identity and access management?</span></h1>\r\nAfter authentication, there needs to be an access control decision. The decision is based on the information available about the user. The difference between identity management and access management is thus:\r\n<ul><li>Identity Management is about managing the attributes related to the user.</li><li>Access Management is about evaluating the attributes based on policies and making Yes/No decisions.</li></ul>\r\nThere are three types of Access Control Systems: \r\n<ul><li>Discretionary Access Control (DAC)</li><li>Mandatory Access Control (MAC)</li><li>Role-Based Access Control (RBAC)</li></ul>\r\n<h1 class=\"align-center\">What are the main benefits of identity management?</h1>\r\nIdentity access and management are useful in many ways: it ensures regulatory compliance, enables cost savings, and simplifies the lives of your customers by enhancing their experience. These are the main benefits of having an IAM solution:\r\n<ul><li><span style=\"font-weight: bold; \">Easily accessible anywhere</span></li></ul>\r\nNowadays, people need their identities all the time to use services and resources. In that sense, they require access to any platform without limits using their IDs, thus eliminating barriers for customers to enter the platform anytime, anywhere.\r\n<ul><li><span style=\"font-weight: bold; \">It encourages the connection between the different parts</span></li></ul>\r\nThe digital transformation that is taking place among more and more organizations forces the need for people, applications and devices to stay connected to each other. And, as expected, all of these processes bring with them some security threats.\r\nHowever, IAM software is a solution that guarantees correct administration with the best identity providers, such as Salesforce, Twitter and Google. Authentication and security are two of the strengths of Identity and Access Management, as well as being extendable and ready for future advances. \r\n<ul><li><span style=\"font-weight: bold; \">It improves productivity</span></li></ul>\r\nIdentity software automates the entry of new personnel and facilitates access to all components of the system with which the company operates. This allows reducing times in the delivery of access so that they begin to produce immediately. For this reason, business agility is also increased by using the advantages that technology makes available to meet the demands of today’s world. \r\n<ul><li><span style=\"font-weight: bold; \">It optimizes user experience</span></li></ul>\r\nRemembering so many usernames and passwords to access social networks, banks and other services on the Internet becomes a challenge for people. Thanks to user identity management system, people can get an identity that provides access to different systems. Single sign-on (SSO) allows customers and partners to access different internal and external applications with the same access method. That way the user experience will not be affected.\r\n<ul><li><span style=\"font-weight: bold; \">Secure your brand at all levels</span></li></ul>\r\nThere will be no risk of security breach, regardless of whether a connection is made from multiple identity providers. Identity management software and access management software enables strong authentication to keep your business and brand secure. Detailed verification of all identities entering the system is performed, in addition to allowing various licenses to limit access levels. At the same time, it monitors through analysis, fraud detection and alert functions that indicate a possible real risk. In short, enterprise identity management system is a reliable tool that employs technology to support digital transformation. A software that provides agility, security and satisfaction to the company’s customers. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IAM.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.ivanti.com/resources/v/doc/case-studies/ivi-1779-pearland-school-district","title":"Web-site of vendor"}},"comments":[],"referencesCount":0}],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"branches":"Education","companySizes":"1001 to 2000 Employees","companyUrl":"https://www.pearlandisd.org/","countryCodes":["USA"],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Pearland Independent School District","keywords":"","description":" Pearland Independent School District is a school district based in Pearland, Texas, United States.<br />Pearland ISD serves most of the city of Pearland, the city of Brookside Village, and unincorporated areas in Brazoria County (including Silverlake).<br />E","og:title":"Pearland Independent School District","og:description":" Pearland Independent School District is a school district based in Pearland, Texas, United States.<br />Pearland ISD serves most of the city of Pearland, the city of Brookside Village, and unincorporated areas in Brazoria County (including Silverlake).<br />E","og:image":"https://old.roi4cio.com/uploads/roi/company/Pearland_district.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[],"vendoredProducts":[],"suppliedProducts":[],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}