{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"role-supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"products-popover":{"de":"die produkte","ru":"Продукты","_type":"localeString","en":"Products"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"_type":"localeString","en":"partners","ru":"партнеры"},"update-profile-button":{"ru":"Обновить профиль","_type":"localeString","en":"Update profile"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"ru":"Компетенции","_type":"localeString","en":"Categories"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"_type":"localeString","en":"Partnership with vendors","ru":"Партнерство с производителями"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"en":"Bonus 4 reference","ru":"Бонус за референс","_type":"localeString"},"partner-status":{"_type":"localeString","en":"Partner status","ru":"Статус партнёра"},"country":{"ru":"Страна","_type":"localeString","en":"Country"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"_type":"localeString","en":"branch","ru":"область деятельности"},"employees-popover":{"_type":"localeString","en":"number of employees","ru":"количество сотрудников"},"partnership-programme":{"ru":"Партнерская программа","_type":"localeString","en":"Partnership program"},"partner-discounts":{"ru":"Партнерские скидки","_type":"localeString","en":"Partner discounts"},"registered-discounts":{"ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString","en":"Additional benefits for registering a deal"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"_type":"localeString","en":"Partner level requirements","ru":"Требования к уровню партнера"},"certifications":{"_type":"localeString","en":"Certification of technical specialists","ru":"Сертификация технических специалистов"},"sales-plan":{"_type":"localeString","en":"Annual Sales Plan","ru":"Годовой план продаж"},"partners-vendors":{"ru":"Партнеры-производители","_type":"localeString","en":"Partners-vendors"},"partners-suppliers":{"ru":"Партнеры-поставщики","_type":"localeString","en":"Partners-suppliers"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"ru":"Производимые продукты","_type":"localeString","en":"Produced products"},"vendor-implementations":{"en":"Produced deployments","ru":"Производимые внедрения","_type":"localeString"},"supplier-implementations":{"_type":"localeString","en":"Supplied deployments","ru":"Поставляемые внедрения"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"not-yet-converted":{"_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"register":{"_type":"localeString","en":"Register","ru":"Регистрация "},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"auth-message":{"_type":"localeString","en":"To view company events please log in or register on the sit.","ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт."},"company-presentation":{"en":"Company presentation","ru":"Презентация компании","_type":"localeString"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"en":"My profile","ru":"Мои данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"en":"Explore IT products by category","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"title":{"ru":"ROI4CIO: Компания","_type":"localeString","en":"ROI4CIO: Company"},"meta":[{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"},{"content":"website","name":"og:type"}],"translatable_meta":[{"name":"title","translations":{"en":"Company","ru":"Компания","_type":"localeString"}},{"name":"description","translations":{"en":"Company description","ru":"Описание компании","_type":"localeString"}},{"translations":{"en":"Company keywords","ru":"Ключевые слова для компании","_type":"localeString"},"name":"keywords"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"bell-integrator":{"id":641,"title":"Bell Integrator","logoURL":"https://old.roi4cio.com/uploads/roi/company/Bell_Integrator.png","alias":"bell-integrator","address":"","roles":[{"id":2,"type":"supplier"}],"description":"Bell Integrator is a global consulting, technology services, and outsourcing company that offers business critical solutions that resolve your most complex IT and business needs. Since 2003 Bell Integrator has been providing full lifecycle services and solutions for top-tier telecom, finance, transportation, and healthcare enterprises. Bell Integrator has over 2,000 employees in 10 locations in US, Mexico, Latvia and Kazakhstan.","companyTypes":["supplier"],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":76,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":3,"supplierPartnersCount":0,"b4r":0,"categories":{"1":{"id":1,"title":"Desktop virtualization","description":" Desktop virtualization is a virtualization technology that separates an individual's PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.\r\nDesktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.\r\nDesktop virtualization has many benefits, including a lower total cost of ownership (TCO), increased security, reduced energy costs, reduced downtime and centralized management.\r\nLimitations of desktop virtualization include difficulty in maintenance and set up of printer drivers; increased downtime in case of network failures; complexity and costs involved in VDI deployment and security risks in the event of improper network management.<br /><br />","materialsDescription":" <span style=\"font-weight: bold; \">What are types of desktop virtualization technologies?</span>\r\nHost-based forms of desktop virtualization require that users view and interact with their virtual desktops over a network by using a remote display protocol. Because processing takes place in a data center, client devices can be traditional PCs, but also thin clients, zero clients, smartphones and tablets. Examples of host-based desktop virtualization technology include:\r\n<span style=\"font-weight: bold; \">Host-based virtual machines:</span> Each user connects to an individual VM that is hosted in a data center. The user may connect to the same VM every time, allowing for personalization (known as a persistent desktop), or be given a fresh VM at each login (a nonpersistent desktop).\r\n<span style=\"font-weight: bold; \">Shared hosted:</span> Users connect to a shared desktop that runs on a server. Microsoft Remote Desktop Services, formerly Terminal Services, takes this client-server approach. Users may also connect to individual applications running on a server; this technology is an example of application virtualization.\r\n<span style=\"font-weight: bold; \">Host-based physical machines:</span> The operating system runs directly on another device's physical hardware.\r\nClient virtualization requires processing to occur on local hardware; the use of thin clients, zero clients and mobile devices is not possible. These types of desktop virtualization include:\r\n<span style=\"font-weight: bold; \">OS image streaming:</span> The operating system runs on local hardware, but it boots to a remote disk image across the network. This is useful for groups of desktops that use the same disk image. OS image streaming, also known as remote desktop virtualization, requires a constant network connection in order to function.\r\n<span style=\"font-weight: bold; \">Client-based virtual machines:</span> A VM runs on a fully functional PC, with a hypervisor in place. Client-based virtual machines can be managed by regularly syncing the disk image with a server, but a constant network connection is not necessary in order for them to function.\r\n<span style=\"font-weight: bold;\">Desktop virtualization vs. virtual desktop infrastructure</span>\r\nThe terms <span style=\"font-style: italic;\">desktop virtualization</span> and virtual desktop infrastructure (VDI) are often used interchangeably, but they are not the same. While VDI is a type of desktop virtualization, not all desktop virtualization uses VDI.\r\nVDI refers to the use of host-based VMs to deliver virtual desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology. Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- are not examples of VDI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_virtualization.png","alias":"desktop-virtualization"}},"branches":"Information Technology","companySizes":"More than 2000 Employees","companyUrl":"http://www.bellintegrator.com/","countryCodes":["KAZ","LVA","USA"],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Bell Integrator","keywords":"Integrator, Bell, that, solutions, business, services, transportation, healthcare","description":"Bell Integrator is a global consulting, technology services, and outsourcing company that offers business critical solutions that resolve your most complex IT and business needs. Since 2003 Bell Integrator has been providing full lifecycle services and solutio","og:title":"Bell Integrator","og:description":"Bell Integrator is a global consulting, technology services, and outsourcing company that offers business critical solutions that resolve your most complex IT and business needs. Since 2003 Bell Integrator has been providing full lifecycle services and solutio","og:image":"https://old.roi4cio.com/uploads/roi/company/Bell_Integrator.png"},"eventUrl":"","vendorPartners":[{"vendor":"Hewlett Packard Enterprise","partnershipLevel":"Silver","countries":"","partnersType":""},{"vendor":"IBM","partnershipLevel":"Premier Business Partner","countries":"","partnersType":""},{"vendor":"McAfee","partnershipLevel":"Silver","countries":"","partnersType":""}],"supplierPartners":[],"vendoredProducts":[],"suppliedProducts":[{"id":3336,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/large-logo-mcafee.png","logo":true,"scheme":false,"title":"McAfee MVISION Mobile","vendorVerified":1,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":110,"alias":"mcafee-mvision-mobile","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<h2>Always-on defense for on-the-go devices</h2>\r\nUnlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, McAfee MVISION Mobile sits directly on mobile devices to provide always-on protection no matter how a device is connected—via a corporate network, public access point, or cellular carrier—and even offline.\r\n<h2>Advanced analysis thwarts advanced attacks</h2>\r\nMachine learning algorithms analyze deviations to device behavior and make determinations about indicators of compromise to accurately identify advanced device, application, and network-based attacks.\r\n<h2>A single console for all devices—including mobile</h2>\r\nAs an integrated component of McAfee Device Security, McAfee MVISION Mobile extends visibility and control of your mobile assets from the same single console of all your McAfee-managed devices, including OS-based endpoints, servers, containers, and embedded IoT devices.","shortDescription":"McAfee MVISION Mobile defends your employees and their devices from the boardroom to the coffeehouse.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee MVISION Mobile","keywords":"","description":"<h2>Always-on defense for on-the-go devices</h2>\r\nUnlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, McAfee MVISION Mobile sits directly on mobile devices to provide always-on protection no matter how a device is con","og:title":"McAfee MVISION Mobile","og:description":"<h2>Always-on defense for on-the-go devices</h2>\r\nUnlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, McAfee MVISION Mobile sits directly on mobile devices to provide always-on protection no matter how a device is con","og:image":"https://old.roi4cio.com/fileadmin/user_upload/large-logo-mcafee.png"},"eventUrl":"","translationId":3341,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":3,"title":"MDM - Mobile Device Management","alias":"mdm-mobile-device-management","description":" <span style=\"font-weight: bold; \">Mobile device management (MDM)</span> is an industry term for the administration of mobile devices, such as smartphones, tablet computers and laptops. Device management system is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices.\r\nMDM is typically a deployment of a combination of on-device applications and configurations, corporate policies and certificates, and backend infrastructure, for the purpose of simplifying and enhancing the IT management of end user devices. In modern corporate IT environments, the sheer number and diversity of managed devices (and user behavior) has motivated device management tools that allow the management of devices and users in a consistent and scalable way. The overall role of MDM is to increase device supportability, security, and corporate functionality while maintaining some user flexibility.\r\nMany organizations administer devices and applications using MDM products/services. Mobile device management software primarily deals with corporate data segregation, securing emails, securing corporate documents on devices, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories. MDM implementations may be either on-premises or cloud-based.\r\nMDM functionality can include over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. Most recently laptops and desktops have been added to the list of systems supported as Mobile Device Management becomes more about basic device management and less about the mobile platform itself. \r\nSome of the <span style=\"font-weight: bold; \">core functions</span> of mobile management software include:\r\n<ul><li>Ensuring that diverse user equipment is configured to a consistent standard/supported set of applications, functions, or corporate policies</li><li>Updating equipment, applications, functions, or policies in a scalable manner</li><li>Ensuring that users use applications in a consistent and supportable manner</li><li>Ensuring that equipment performs consistently</li><li>Monitoring and tracking equipment (e.g. location, status, ownership, activity)</li><li>Being able to efficiently diagnose and troubleshoot equipment remotely</li></ul>\r\nDevice management solutions are leveraged for both company-owned and employee-owned (Bring Your Own Device) devices across the enterprise or mobile devices owned by consumers. Consumer demand for BYOD is now requiring a greater effort for MDM and increased security for both the devices and the enterprise they connect to, especially since employers and employees have different expectations concerning the types of restrictions that should be applied to mobile devices.\r\nBy controlling and protecting the data and configuration settings of all mobile devices in a network, enterprise device management software can reduce support costs and business risks. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime.\r\nWith mobile devices becoming ubiquitous and applications flooding the market, mobile monitoring is growing in importance. The use of mobile device management across continues to grow at a steady pace, and is likely to register a compound annual growth rate (CAGR) of nearly 23% through 2028. The US will continue to be the largest market for mobile device management globally. ","materialsDescription":"<h1 class=\"align-center\">How Mobile Device Management works?</h1>\r\nMobile device management relies on endpoint software called an MDM agent and an MDM server that lives in a data center. IT administrators configure policies through the MDM server's management console, and the server then pushes those policies over the air to the MDM agent on the device. The agent applies the policies to the device by communicating with application programming interfaces (APIs) built directly into the device operating system.\r\nSimilarly, IT administrators can deploy applications to managed devices through the MDM server. Mobile software management emerged in the early 2000s as a way to control and secure the personal digital assistants and smartphones that business workers began to use. The consumer smartphone boom that started with the launch of the Apple iPhone in 2007 led to the bring your own device trend, which fueled further interest in MDM.\r\nModern MDM management software supports not only smartphones but also tablets, Windows 10 and macOS computers and even some internet of things devices. The practice of using MDM to control PCs is known as unified endpoint management.\r\n<h1 class=\"align-center\">Key Benefits of Mobile Device Management Software</h1>\r\n<span style=\"font-weight: bold;\">Reduce IT Administration.</span> Instead of manually configuring and testing each new mobile device, mobile device software takes care of the repetitive tasks for you. That gives IT staff more time to work on challenging projects that improve productivity.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Improve End-user Productivity. </span>Mobile device management helps end users become more productive because the process of requesting new mobile devices can be cut down from days to hours. Once end users have the device in their hands, mobile device management program helps them get set up on their corporate network much faster. That means less time waiting to get access to email, internal websites, and calendars.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Reduce IT Risk.</span> Mobile devices, especially if your organization allows “Bring Your Own Device” (BYOD), create increased risk exposures. Typically, IT managers respond to these risks in one of two ways, neither of which help. First, you may say “no” to mobile device requests. That’s a fast way to become unpopular. Second, you may take a manual approach to review and oversee each device.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Enable Enterprise Growth. </span>If your enterprise added a thousand employees this quarter through hiring, acquisition, or other changes, could IT handle the challenge? If you’re honest, you can probably imagine going through plenty of struggles and missing SLAs. That kind of disappointment and missed service expectations make end users respect IT less. \r\nBy using enterprise device management thoroughly, you'll enable enterprise growth. You'll have the systems and processes to manage 100 users or 10,000 users. That means IT will be perceived as enabling growth not standing in the way.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MDM_Mobile_Device_Management.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"In each system, which involves the communication of users, there is always the problem of spam, or the mass mailing of unsolicited emails, which is solved using the antispam system. An antispam system is installed to catch and filter spam at different levels. Spam monitoring and identification are relevant on corporate servers that support corporate email, here the antispam system filters spam on the server before it reaches the mailbox. There are many programs that help to cope with this task, but not all of them are equally useful. The main objective of such programs is to stop sending unsolicited letters, however, the methods of assessing and suppressing such actions can be not only beneficial but also detrimental to your organization. So, depending on the rules and policies of mail servers, your server, or even a domain, may be blacklisted and the transfer of letters will be limited through it, and you may not even be warned about it.\r\nThe main types of installation and use of anti-spam systems:\r\n<ul><li>installation of specialized equipment, a gateway that filters mail before it reaches the server;</li><li>use of external antispam systems for analyzing emails and content;</li><li>setting up an antispam system with the ability to learn on the mail server itself;</li><li>installation of spam filtering software on the client’s computer.</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">Anti-spam technologies:</span>\r\n<span style=\"font-weight: bold;\">Heuristic analysis</span>\r\nExtremely complex, highly intelligent technology for empirical analysis of all parts of a message: header fields, message bodies, etc. Not only the message itself is analyzed. The heuristic analyzer is constantly being improved, new rules are continuously added to it. It works “ahead of the curve” and makes it possible to recognize still unknown varieties of spam of a new generation before the release of available updates.\r\n<span style=\"font-weight: bold;\">Filtering counteraction</span>\r\nThis is one of the most advanced and effective anti-spam technologies. It is to recognize the tricks resorted to by spammers to bypass anti-spam filters.\r\n<span style=\"font-weight: bold;\">HTML based analysis</span>\r\nHTML code comparable to samples of HTML signatures in antispam. Such a comparison, using the available data on the size of typical spam images, protects users from spam messages using HTML-code, which are often included in the online image.\r\n<span style=\"font-weight: bold;\">Spam detection technology for message envelopes</span>\r\nDetection of fakes in the "stamps" of SMTP-servers and in other elements of the e-mail header is the newest direction in the development of anti-spam methods. Email addresses can not be trusted. Fake emails contain more than just spam. For example, anonymous and even threats. Technologies of various anti-spam systems allow you to send such messages. Thus, it provides not only the economic movement, but also the protection of employees.\r\n<span style=\"font-weight: bold;\">Semantic analysis</span>\r\nMeaning in words and phrases is compared with typical spam vocabulary. Comparison of provisions for a special dictionary, for expression and symbols.\r\n<span style=\"font-weight: bold;\">Anti-camming technology</span>\r\nScamming is probably the most dangerous type of spam. All of them have the so-called "Nigerian letters", reports of winnings in the lottery, casino, fake letters and credit services.\r\n<span style=\"font-weight: bold;\">Technical spam filtering</span>\r\nAutomatic notification of e-mail - bounce-messages - to inform users about the malfunction of the postal system (for example, non-delivery of address letters). Attackers can use similar messages. Under the guise of a technical notification, computer service or ordinary spam can penetrate the computer.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Antispam.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":" <span style=\"font-weight: bold; \">Web filtering</span> is a technology that stops users from viewing certain URLs or websites by preventing their browsers from loading pages from these sites. Web filters are made in different ways and deliver various solutions for individual, family, institutional or enterprise use.\r\nIn general, Web filters work in two distinct ways. They can <span style=\"font-weight: bold; \">block content</span> as determined by quality of the site, by consulting known lists which document and categorize popular pages across all genres of content. Or, they can <span style=\"font-weight: bold; \">evaluate the content</span> of the page live and block it accordingly. Many Web filter tools work off of a constantly updated URL database that shows which websites and domains are associated with hosting malware, phishing, viruses or other tools for harmful activities.\r\n<span style=\"font-weight: bold;\">Web Filtering Types.</span> <span style=\"font-style: italic;\">Blacklist & Whitelist Filters:</span>when using blacklists, an administrator (which might be a parent) manually enters all websites that are deemed inappropriate into the program, and those sites are subsequently blocked. Whitelists are used in exactly the same way, only in reverse – i.e. URLs are manually entered onto a whitelist, and all other websites are then off-limits.\r\n<span style=\"font-style: italic; \">Keyword And Content Filters: </span>this type of filtering is in many ways similar to black and whitelist filtering, though with a slightly broader scope. Keyword and content filters will filter out websites that contain specific keywords or predefined content (such as pornography, for example).\r\nSome website filtering software also provides reporting so that the installer can see what kind of traffic is being filtered and who has requested it. Some products provide soft blocking (in which a warning page is sent to the user instead of the requested page while still allowing access to the page) and an override capability that allows an administrator to unlock a page. \r\n<span style=\"font-weight: bold; \">Web Filtering Software for Business.</span> Most organizations have moved to cloud based-applications, making browsers a tool that employees use on a daily basis to access work. Browsers have become a conduit to not only the cloud, but also to immeasurable malware and distractions hosted on the web. In order to ensure that browsers do not bring in malicious traffic, web filtering software becomes necessary.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">What is Enterprise Web Filtering Software?</h1>\r\nAntivirus and antimalware software are required to detect malicious programs that has been downloaded, but it is now important for enterprise web filtering software to be installed. Content filtering software is an invaluable protection against a wide range of web-borne threats. Rather than allowing malware and ransomware to be downloaded, it prevents end users from visiting websites that contain these malicious threats.\r\nInternet filtering software is also one of the most effective ways to neutralize the threat from phishing. Phishing is a technique used by cybercriminals to gain access to sensitive user information. Phishers trick end users into revealing login credentials or downloading malicious software onto their computers.\r\nPhishing involves sophisticated social engineering techniques to fool end users into visiting malicious websites. If employees can be convinced to reveal sensitive information or download ransomware or malware, cybercriminals can easily bypass even the most sophisticated of cybersecurity defenses.\r\n<h1 class=\"align-center\">What is URL Filtering?</h1>\r\nURL filtering is a type of network filtering software that helps businesses control their users’ and guests’ ability to access certain content on the web. If you’ve ever gotten a “block” page while surfing the internet at the office, then your company is using web filtering.\r\nSome employers may only be concerned about blocking access to websites that are known to spread malware or steal information. Other businesses may block content they find inappropriate, such as adult websites or sites that promote violence, or content that violates compliance regulations. They may also choose to activate web protection software to block social media or video streaming sites to minimize drains on productivity and network bandwidth.\r\nTypically, URL filtering software is provided by a cybersecurity service, firewall, or router. Each of these may use a variety of threat intelligence sources to determine which websites fit into their chosen acceptable and unacceptable categories. That’s where highly reliable web reputation services are most valuable. Sources that have extensive web histories and real-time active crawling services will provide the most accurate content determinations.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_filtering.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4925,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/HP_Integrity_Superdome.png","logo":true,"scheme":false,"title":"HP Integrity Superdome","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":451,"alias":"hp-integrity-superdome","companyTitle":"Hewlett Packard Enterprise","companyTypes":["supplier","vendor"],"companyId":172,"companyAlias":"hewlett-packard-enterprise","description":"HP Superdome is the family of enterprise-class high-performance servers manufactured with both the PA-8900 processors (HP 9000 family) and Intel Itanium 2 processors (HP Integrity family). Superdome is represented by three models with 16, 32 and 64 processor sockets. Within the family, there is the possibility of moving from younger models to older ones, which ensures a reduction in initial costs, investment protection and the possibility of a phased increase in system performance. Superdome is a universal hierarchical crossbar architecture specifically designed to work with various types of processors. The main components of the architecture are Cells, Crossbar Backplane, and I / O subsystems.<br />\r\nThe cell board is the main unit of the Superdome system. It is a symmetrical multiprocessor (SMP) containing 4 processor sockets and up to 64 GB of main memory. It is possible (but not necessary) to connect to the cell its own I / O subsystem, which is an I / O basket with 12 PCI-X slots. Each cell can work in different configurations, i.e., be connected to other cells or form an independent independent server. In one system, cell boards can be combined with both PA-RISC processors and Itanium processors.<br />\r\nBackplane patch panels provide a non-blocking connection between cells, their associated memory, and I / O modules. The main principle underlying Superdome is the balanced performance of the system at all levels of the hierarchy in order to exclude the appearance of additional delays when the processors of one cell access the RAM located on other cells. The developed architecture allows the system to demonstrate record performance indicators for various types of tasks, such as operational transaction processing, technical calculations, processing of Internet transactions, analysis of large volumes of data, etc.<br />\r\nA single Superdome system can be logically divided into many hardware independent, software independent partitions, virtual machines, or resource partitions within a single server. Each hardware / software partition or virtual machine is running its own independent operating system. For cells with PA-RISC processors, the operating system is HP-UX 11i, and for cells with Itanium processors, HP-UX, Linux, Microsoft Windows 2003, and OpenVMS.\r\nTo implement effective system management and technical support, the Superdome server family includes:\r\n<ul><li>Event Monitoring System (EMS), an alert service that monitors the status of server hardware, including processors, memory, FC components, system buses, cache, system temperature, battery status, fans, power supplies.</li></ul>\r\n<ul><li>A hardware inventory service in Support Tools Manager (STM) that provides system inventory information, including serial numbers, part numbers, version levels, and so on.</li></ul>\r\n<ul><li>Support Management Station (SMS), which is used to start the process of scanning, diagnostics and testing the platform throughout the life cycle, including upgrades.</li></ul>\r\nThe Superdome family provides customers with investment protection and uptime thanks to a system infrastructure designed to upgrade to next-generation processors.","shortDescription":"HP Superdome is a premium server designed and manufactured by Hewlett Packard Enterprise.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"HP Integrity Superdome","keywords":"","description":"HP Superdome is the family of enterprise-class high-performance servers manufactured with both the PA-8900 processors (HP 9000 family) and Intel Itanium 2 processors (HP Integrity family). Superdome is represented by three models with 16, 32 and 64 processor s","og:title":"HP Integrity Superdome","og:description":"HP Superdome is the family of enterprise-class high-performance servers manufactured with both the PA-8900 processors (HP 9000 family) and Intel Itanium 2 processors (HP Integrity family). Superdome is represented by three models with 16, 32 and 64 processor s","og:image":"https://old.roi4cio.com/fileadmin/user_upload/HP_Integrity_Superdome.png"},"eventUrl":"","translationId":4926,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4934,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IBM_LOGO.png","logo":true,"scheme":false,"title":"IBM WebSphere Enterprise Service Bus (ESB)","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":100,"alias":"ibm-websphere-enterprise-service-bus-esb","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"<span style=\"font-weight: bold; \">Features IBM WebSphere Enterprise Service Bus (ESB):</span><br />\r\n<ul><li>Brings consistency to point-to-point connectivity</li></ul>\r\n<ul><li>Provides smart connectivity on internet-standard application infrastructure, to connect any application or data</li></ul>\r\n<ul><li>Supports a broad range of native bindings and adapters for service-oriented integration, incl. web services, MQ and JMS messaging, HTTP, EJB, databases, files. file transfer, email, Lotus Domino, System i (RPG programs), CICS, IMS, SAP, Oracle, Siebel, PeopleSoft, JDEdwards.</li></ul>\r\n<ul><li>Integrates seamlessly with the industry-leading WebSphere software platform for streamlined IT operations</li></ul>\r\n<ul><li>Extends easily to IBM Business Process Manager Advanced for service orchestration and BPM</li></ul>\r\n<ul><li>Tightly integrates with WebSphere Service Registry and Repository for SOA solutions</li></ul>\r\n<ul><li>Leverages declarative IBM Integration Designer for visual programming and testing</li></ul>\r\n<ul><li>Provides an integrated solution for both service mediation and service hosting</li></ul>\r\n<ul><li>WebSphere ESB is easy to use from both a tools and a run-time perspective. IBM Integration Designer, the development tool of choice for WebSphere ESB, delivers an integrated, interactive, and visual development experience that requires minimal programming skills. You can get up and running quickly with a compelling out-of-the-box experience that is supported by easy-to-understand samples and comprehensive documentation.</li></ul>","shortDescription":"IBM WebSphere Enterprise Service Bus (ESB) provides fast and flexible application integration with smaller costs and opens an opportunity for use of methods of interaction of the next generation.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM WebSphere Enterprise Service Bus (ESB)","keywords":"","description":"<span style=\"font-weight: bold; \">Features IBM WebSphere Enterprise Service Bus (ESB):</span><br />\r\n<ul><li>Brings consistency to point-to-point connectivity</li></ul>\r\n<ul><li>Provides smart connectivity on internet-standard application infrastructure, to co","og:title":"IBM WebSphere Enterprise Service Bus (ESB)","og:description":"<span style=\"font-weight: bold; \">Features IBM WebSphere Enterprise Service Bus (ESB):</span><br />\r\n<ul><li>Brings consistency to point-to-point connectivity</li></ul>\r\n<ul><li>Provides smart connectivity on internet-standard application infrastructure, to co","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IBM_LOGO.png"},"eventUrl":"","translationId":4935,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":401,"title":"Service-Oriented Architecture and Web Services","alias":"service-oriented-architecture-and-web-services","description":" Service-oriented architecture (SOA) is a style of software design where services are provided to the other components by application components, through a communication protocol over a network. An SOA service is a discrete unit of functionality that can be accessed remotely and acted upon and updated independently, such as retrieving a credit card statement online. SOA is also intended to be independent of vendors, products and technologies.\r\nA service has four properties according to one of many definitions of SOA:\r\n<ul><li>It logically represents a business activity with a specified outcome.</li><li>It is self-contained.</li><li>It is a black box for its consumers, meaning the consumer does not have to be aware of the service's inner workings.</li><li>It may consist of other underlying services.</li></ul>\r\nDifferent services can be used in conjunction to provide the functionality of a large software application,[4] a principle SOA shares with modular programming. Service-oriented architecture integrates distributed, separately maintained and deployed software components. It is enabled by technologies and standards that facilitate components' communication and cooperation over a network, especially over an IP network.\r\nSOA is related to the idea of an application programming interface (API), an interface or communication protocol between different parts of a computer program intended to simplify the implementation and maintenance of software. An API can be thought of as the service, and the SOA the architecture that allows the service to operate.","materialsDescription":" <span style=\"font-weight: bold;\">What is Service-Oriented Architecture?</span>\r\nService-oriented architecture (SOA) is a software architecture style that supports and distributes application components that incorporates discovery, data mapping, security and more. Service-oriented architecture has two main functions:\r\n<ol><li>Create an architectural model that defines goals of applications and methods that will help achieve those goals.</li><li>Define implementations specifications linked through WSDL (Web Services Description Language) and SOAP (Simple Object Access Protocol) specifications.</li></ol>\r\nService-oriented architecture principles are made up of nine main elements:\r\n<ol><li>Standardized Service Contract where services are defined making it easier for client applications to understand the purpose of the service.</li><li>Loose Coupling is a way to interconnecting components within the system or network so that the components can depend on one another to the least extent acceptable. When a service functionality or setting changes there is no downtime or breakage of the application running.</li><li>Service Abstraction hides the logic behind what the application is doing. It only relays to the client application what it is doing, not how it executes the action.</li><li>Service Reusability divides the services with the intent of reusing as much as possible to avoid spending resources on building the same code and configurations.</li><li>Service Autonomy ensures the logic of a task or a request is completed within the code.</li><li>Service Statelessness whereby services do not withhold information from one state to another in the client application.</li><li>Service Discoverability allows services to be discovered via a service registry.</li><li>Service Composability breaks down larger problems into smaller elements, segmenting the service into modules, making it more manageable.</li><li>Service Interoperability governs the use of standards (e.g. XML) to ensure larger usability and compatibility.</li></ol>\r\n<span style=\"font-weight: bold;\">How Does Service-Oriented Architecture Work?</span>\r\nA service-oriented architecture (SOA) works as a components provider of application services to other components over a network. Service-oriented architecture makes it easier for software components to work with each other over multiple networks.\r\nA service-oriented architecture is implemented with web services (based on WSDL and SOAP), to be more accessible over standard internet protocols that are on independent platforms and programming languages.\r\nService-oriented architecture has 3 major objectives all of which focus on parts of the application cycle:\r\n<ol><li>Structure process and software components as services – making it easier for software developers to create applications in a consistent way.</li><li>Provide a way to publish available services (functionality and input/output requirements) – allowing developers to easily incorporate them into applications.</li><li>Control the usage of these services for security purposes – mainly around the components within the architecture, and securing the connections between those components.</li></ol>\r\nMicroservices architecture software is largely an updated implementation of service-oriented architecture (SOA). The software components are created as services to be used via APIs ensuring security and best practices, just as in traditional service-oriented architectures.\r\n<span style=\"font-weight: bold;\">What are the benefits of Service-Oriented Architecture?</span>\r\nThe main benefits of service-oriented architecture solutions are:\r\n<ul><li>Extensibility – easily able to expand or add to it.</li><li>Reusability – opportunity to reuse multi-purpose logic.</li><li>Maintainability – the ability to keep it up to date without having to remake and build the architecture again with the same configurations.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Service_Oriented_Architecture_and_Web_Services.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4938,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/ibm_filenet_p8_platform.png","logo":true,"scheme":false,"title":"IBM FileNet P8 Platform","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":100,"alias":"ibm-filenet-p8-platform","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"The FileNet P8 platform offers enterprise-level scalability and flexibility to handle the most demanding content challenges, the most complex business processes, and integration to all your existing systems. FileNet P8 is a reliable, scalable, and highly available enterprise platform that enables you to capture, store, manage, secure, and process information to increase operational efficiency and lower total cost of ownership. FileNet P8 enables you to streamline and automate business processes, access and manage all forms of content, and automate records management to help meet compliance needs.<br />\r\nThe FileNet P8 family of products includes back-end services, development tools, and applications that address enterprise content and process management requirements.\r\n<span style=\"font-weight: bold;\">Content management</span><br />At the core of the platform are repository services for capturing, managing, and storing your business-related digital assets. Multiple repositories, called object stores, can be created and managed within a single system to serve your business requirements.<br />\r\n<span style=\"font-weight: bold;\">Integration with external content repositories</span><br />\r\nIBM® FileNet Content Federation Services enables you to integrate data in an external repository with FileNet P8 and access the documents as though they are stored in an object store. An external repository acts like a virtual storage area for the Content Platform Engine system.<br />\r\n<span style=\"font-weight: bold;\">Workflow management</span><br />\r\nFileNet P8 lets you create, modify, manage, analyze, and simulate business processes, or workflows, that are performed by applications, enterprise users, and external users such as partners and customers.<br />\r\n<span style=\"font-weight: bold;\">Application environment</span><br />\r\nThe FileNet P8 platform includes an application environment to provide users with enterprise content management (ECM) functionality. IBM Content Navigator is a web client that provides users with a console for working with content from multiple content servers, including content that is stored on Content Platform Engine object stores.<br />\r\n<span style=\"font-weight: bold;\">Application integration</span><br />\r\nFileNet P8 tools help you integrate with various vendor applications.<br />\r\n<span style=\"font-weight: bold;\">Records management</span><br />\r\nDesigned to solve today's process-oriented enterprise records management and compliance needs, IBM Enterprise Records is a records management solution that can help companies manage risk through effective, enforceable records management policy, for achievable and cost-effective compliance. IBM Enterprise Records is fully integrated with the FileNet P8 platform.<br />\r\n<span style=\"font-weight: bold;\">System management</span><br />\r\nFileNet P8 provides a complete set of system administration tools that allow for monitoring, validation, and configuration changes from a central location with a dispersed deployment. These tools, described in the following sections, can be used to manage the entire system.<br />\r\n<span style=\"font-weight: bold;\">Enterprise capabilities</span><br />\r\nFileNet P8 components provide the enterprise-level capabilities that are required for solving critical business requirements. This section enumerates these product characteristics.","shortDescription":"IBM® FileNet® P8 Platform is a next-generation, unified enterprise foundation for the integrated IBM FileNet P8 products. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM FileNet P8 Platform","keywords":"","description":"The FileNet P8 platform offers enterprise-level scalability and flexibility to handle the most demanding content challenges, the most complex business processes, and integration to all your existing systems. FileNet P8 is a reliable, scalable, and highly avail","og:title":"IBM FileNet P8 Platform","og:description":"The FileNet P8 platform offers enterprise-level scalability and flexibility to handle the most demanding content challenges, the most complex business processes, and integration to all your existing systems. FileNet P8 is a reliable, scalable, and highly avail","og:image":"https://old.roi4cio.com/fileadmin/user_upload/ibm_filenet_p8_platform.png"},"eventUrl":"","translationId":4939,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":182,"title":"CMS - Content management system","alias":"cms-content-management-system","description":"A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment.\r\nCMS features vary widely. Most CMSs include Web-based publishing, format management, history editing and version control, indexing, search and retrieval. By their nature, content management systems support the separation of content and presentation.\r\nContent management software solutions are typically used for enterprise content management systems (ECM) and web site content management systems (WCM). An ECM facilitates collaboration in the workplace by integrating document management, digital asset management and records retention functionalities, and providing end users with role-based access to the organization's digital assets. A WCM facilitates collaborative authoring for websites. ECM software often includes a WCM publishing functionality, but ECM webpages typically remain behind the organization's firewall.\r\nBoth enterprise content management and web content management systems have two components: a content management application (CMA) and a content delivery application (CDA). The CMA is a graphical user interface (GUI) that allows the user to control the design, creation, modification and removal of content from a website without needing to know anything about HTML. The CDA component provides the back-end services that support management and delivery of the content once it has been created in the CMA.\r\nDigital asset management systems are another type of CMS. They manage content with a clearly defined author or ownership, such as documents, movies, pictures, phone numbers, and scientific data. Companies also use CMSs to store, control, revise, and publish documentation.\r\nBased on market share statistics, the most popular CMS is WordPress, used by more than 28% of all websites on the Internet, and by 59% of all websites using a known content management system, followed by Joomla and Drupal.\r\n<span style=\"font-weight: bold;\">Content management systems typically provide the following features:</span>\r\n<ul><li>Search engine optimization</li><li>Integrated and online documentation</li><li>Modularity and extensibility</li><li>User and group functionality</li><li>Templating support for changing designs</li><li>Installation and upgrade wizards</li><li>Integrated audit logs</li><li>Compliance with various accessibility frameworks and standards, such as WAI-ARIA</li><li>Reduced need to code from scratch</li><li>Unified user experience</li><li>Version control</li><li>Edit permission management</li></ul>","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What is a CMS?</span></h1>\r\nAnswer: CMS is an acronym for "Content Management System". You may see some variations on this term, but they all refer to the same concept. Variations include:\r\n<ul><li>Content Management System</li><li>Web CMS</li><li>Web Content Management System</li><li>CMS Platform</li><li>Content Management Platform</li><li>CMS System</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What does a CMS do?</span></h1>\r\n<p class=\"align-left\">In it's simplest terms, Content Management Systems are designed to help users create and manage their websites. Content management solutions help webmasters manage the many different resources, content types and various data that make up modern web sites.</p>\r\n<p class=\"align-left\">At a minimum, modern websites make use of HTML, CSS, JavaScript and images (jpeg, gif, png, etc) to create web content for visitors to read. At the core of every CMS is the ability to organize these resources and generate valid content that can be read by web browsers. </p>\r\n<p class=\"align-left\">More advanced websites have interactive components (comment sections, forums, e-commerce...) that requires server software to validate and save user submitted content.<br />All of the top CMS platforms have features built-in or available for download as addons for all of these features.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the main types of CMS?</span></h1>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Simple CMS.</span> This system is used to create simple websites that contain several pages using simple control systems. Simple content management systems consist of several modules that are set one time. These CMSs are free and are available on the internet. Among their disadvantages are the inability to change settings, low transmission capacity, inability to create pages dynamically and the inability of ato delegateion of administrator’s credentials to others.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"> </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Template CMS.</span> It consists of modules as well, but its structure is more complex if compared to a simple CMS. Template CMS has high transmission capacity, around 50,000 inquiries. Also, it has the support of dynamic pages and the ability to delegate the administrator’s credentials. Many template systems are used to create website content because they are easy to use.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"> </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Professional CMS</span>. This type of CMS has a higher level of complexity. You may change the structure of internet resources. Additional modules can be attached to these systems. These systems are used to create information portals or massive projects. As a rule, these CMSs are a paid resource.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"> </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Universal CMS</span>. Universal systems have wide functionality and ample opportunities to develope websites of any complexity. They support the functions of changing the structure, creating dynamic pages, modification of settings and credential distribution. Universal CMS is quite expensive. These CMSs are used for work with large portals and web-projects that require high functionality and dynamics.<br /><br /><br /><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CMS_-_content_management_system.png"},{"id":66,"title":"BPM - Business Process Management","alias":"bpm-business-process-management","description":"<span style=\"font-weight: bold; \">Business process management (BPM)</span> is a discipline in operations management in which people use various methods to discover, model, analyze, measure, improve, optimize, and automate business processes. BPM focuses on improving corporate performance by managing business processes. Any combination of methods used to manage a company's business processes is BPM. Processes can be structured and repeatable or unstructured and variable.\r\nAs an approach, BPM sees processes as important assets of an organization that must be understood, managed, and developed to announce and deliver value-added products and services to clients or customers. This approach closely resembles other total quality management or continuous improvement process methodologies. ISO 9000 promotes the process approach to managing an organization.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Successfully employing BPM usually involves the following:</span>\r\nOrganizing around outcomes not tasks to ensure the proper focus is maintained\r\nCorrecting and improving processes before (potentially) automating them; otherwise all you’ve done is make the mess run faster\r\nEstablishing processes and assigning ownership lest the work and improvements simply drift away – and they will, as human nature takes over and the momentum peters out\r\nStandardizing processes across the enterprise so they can be more readily understood and managed, errors reduced, and risks mitigated\r\nEnabling continuous change so the improvements can be extended and propagated over time\r\nImproving existing processes, rather than building radically new or “perfect” ones, because that can take so long as to erode or negate any gains achieved\r\n<span style=\"font-weight: bold; \">Business Process Management Software (BPMS)</span> is a process automation tool. It helps you map out your everyday processes to identify and eliminate bottlenecks, control your company’s costs, make your day-to-day processes as efficient as possible, and ensure the effectiveness of the people involved in your processes. A business process management solution to a company’s needs begins with the alignment of business goals with an eye toward creating value through process change initiatives. This alignment leads to a thorough understanding and design of representative processes typically following an industry standard framework \r\nA BPM based foundation provides for complete lifecycle management of business processes, integration across technologies, and imbeds efficiency among people, processes, and technologies.\r\nCommercial business process management tools tend to center on the automation of business processes, essentially moving them from manual pen-and-paper endeavors to effortless automated transactions. BPM software products track how business information is used and then maps the relevant business process and ensure that transactions are done accordingly. This effectively shows where data and process bottlenecks occur and highlights various deficiencies in business processes, including areas where resources are wasted, allowing managers streamline and optimize those processes.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">There are three key types of BPMS:</span></p>\r\n<span style=\"font-weight: bold; \">Efficiency Monitors:</span>Monitors every system of the enterprise for inefficiency in the processes by following it from start to finish. BPM program accurately pinpoints weakness and bottlenecks where customers might get frustrated and discontinue transactions and processes.\r\n<span style=\"font-weight: bold; \">Workflow Software:</span> Uses detailed maps of an existing processes and tries to streamline them by optimizing certain steps. BPM workflow software cannot suggest improvements to the process, only optimize it, so this software is only as good as the process itself.\r\n<span style=\"font-weight: bold; \">Enterprise Application Integration Tools:</span> A mixture of efficiency monitors, process and workflow management, EAI software is used to integrate legacy systems into new systems. This software can be used to map points for integrating old and new systems, optimizing their information-gathering characteristics and increasing the efficiency of system communications.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\">What Are the Types of Business Process Management Software?</h1>\r\n<p class=\"align-center\">There are <span style=\"font-weight: bold; \">three basic kinds</span> of BPM frameworks:</p>\r\n<span style=\"font-weight: bold; \">Horizontal frameworks.</span>They deal with design and development of business processes. They are generally focused on technology and reuse.\r\n<span style=\"font-weight: bold; \">Vertical BPM frameworks.</span> This focuses on specific sets of coordinated tasks, using pre-built templates which can be easily deployed and configured.\r\n<span style=\"font-weight: bold; \">Full-service BPM suites.</span> They have five basic components: Process discovery and project scoping; Process modeling and design; Business rules engine; Workflow engine; Simulation and testing.\r\n<p class=\"align-center\">There are <span style=\"font-weight: bold; \">two types of BPM software</span> as it pertains to deployment:<span style=\"font-weight: bold; \"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">On-premise</span> business process management (BPM). This has been the norm for most enterprises.</p>\r\n<span style=\"font-weight: bold; \">Software as a Service (SaaS).</span> Advances in cloud computing have led to an increased interest in various “software-on-demand” offerings.\r\n<h1 class=\"align-center\">What are BPM Tools?</h1>\r\n<span style=\"font-weight: bold; \">Business Process Management (BPM) tools</span> are used for automating, measuring and optimizing business processes. BPM automation tools use workflow and collaboration to provide meaningful metrics to business leaders.\r\n<span style=\"font-weight: bold; \">Misconceptions about BPM Tools.</span> There’s a common misconception that BPM tools do not easily demonstrate their benefit to the organization. While the benefit from using BPM tools can be hard to quantify, it can be expressed more effectively in terms of business value.\r\n<span style=\"font-weight: bold; \">Process Management Tools.</span> Tools that allow process managers (those that are responsible for organizing the process or activity) to secure the resources needed to execute it, and measure the results of the activity, providing rewards or corrective feedback when necessary. Process manager tools also allows process managers to change and improve the process whenever possible.\r\n<span style=\"font-weight: bold;\">Process Modeling Tools.</span> Software tools that let managers or analysts create business process diagrams. Simple tools only support diagramming. Professional Process Modeling Tools store each model element in a database so that they can be reused on other diagrams or updated. Many business process improvement software supports simulation or code generation.<br /><br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/BPM_-_Business_Process_Management.png"},{"id":146,"title":"ECM - Enterprise Content Management","alias":"ecm-enterprise-content-management","description":"<span style=\"font-weight: bold; \">Enterprise content management (ECM)</span> extends the concept of content management by adding a time line for each content item and possibly enforcing processes for the creation, approval and distribution of them. Systems that implement ECM generally provide a secure repository for managed items, be they analog or digital, that indexes them. They also include one or more methods for importing content to bring new items under management and several presentation methods to make items available for use. The key feature of ECM that distinguishes it from "simple" content management is that an ECM is at least cognizant of the processes and procedures of the enterprise it is created for, and as such is particular to it. \r\nECM as an umbrella term covers enterprise document management system, Web content management, search, collaboration, records management, digital asset management (DAM), workflow management, capture and scanning. ECM is primarily aimed at managing the life-cycle of information from initial publication or creation all the way through archival and eventual disposal. ECM enterprise content management software is delivered in four ways:\r\n- on-premises software (installed on an organization's own network)\r\n- software as a service (SaaS) (Web access to information that is stored on a software manufacturer's system)\r\n- a hybrid composed of both on-premises and SaaS components\r\n- Infrastructure as a Service (IaaS) (which refers to online services that abstract the user from the details of infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc.)\r\n<span style=\"font-weight: bold;\">ECM provides</span> a centralized platform where content can be held and disseminated in a manner that meets regulatory compliance requirements and risk management guidelines. An ECM achieves the latter two benefits by eliminating ad hoc processes that can expose an enterprise to regulatory compliance risks and other potential problems. Full-function enterprise content management solutions include features such as content taxonomies, auditing capabilities, check-in/check-out and other workflow controls and security mechanisms.\r\nAn <span style=\"font-weight: bold;\">effective ECM </span>can streamline access and business processes, eliminate bottlenecks by reducing storage, as well as paper and mailing needs, optimize security, maintain integrity and minimize overhead. All of these can lead to increased productivity. The first step is to document all the types of content that the organization deals with, the business processes its part of and who handles the content. \r\nECM software can be used to identify duplicate and near-duplicate content, allowing the organization to keep a few copies of a particular piece of content instead of hundreds. The best ECM software extends the reach of traditional ECM capabilities into previously isolated applications and information silos, such as ERP, CRM, SCM and HCM, to take the shape of a content services platform. Information can now flow across the enterprise to the people and processes—when, where and in whatever context it is needed.\r\nTo understand more specific ways it could help your company, consider these <span style=\"font-weight: bold; \">three types of ECM</span> software solutions.\r\n<span style=\"font-weight: bold; \">Web Content Management.</span> WCM puts control over the look and feel of a website in the hands of specific, key people. It’s used by organizations with relatively complex websites and strict brand guidelines, giving those key personnel the means to easily update, modify and publish content for the sites while adhering to the guidelines.\r\n<span style=\"font-weight: bold; \">Collaborative Content Management.</span> CCM enables multiple people to access and modify a single document, such as a legal document. It’s ideal for organizations that must manage projects involving multiple stakeholders. CCM makes it easy to work together while keeping track of, and updating, the most-current version of the document.\r\n<span style=\"font-weight: bold; \">Transactional Content Management.</span> This type of ECM document management is designed for organizations that repeatedly use varied types of content, including records, paper documents, and digital files. TCM solutions capture content from various channels, classify it, store it, create an automated workflow to ensure the right user receives the content at the right time, and even deletes documents when they’re no longer needed, all while working seamlessly with other apps and databases, ensuring all of that content is available throughout the company.<br /><br /><br />\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: bold; \">What is Enterprise Content Management (ECM)?</span></h1>\r\nEnterprise Content Management is the organization of structured and unstructured documents using technology and software that allows your organization to “work smarter, not harder.” As technology advanced and everything became digital, organizations needed a new way to store and access files, leading to the creation of ECM. \r\nECM document management system consists of four main points:\r\n<ul><li><span style=\"font-weight: bold; \">Capture:</span> Capturing information from hardcopy documents or online forms and transferring it into the system</li><li><span style=\"font-weight: bold; \">Manage:</span> Managing the captured data in a structured format that allows quick and easy retrieval</li><li><span style=\"font-weight: bold; \">Storing:</span> Securely storing files in a central repository that can be accessed from multiple locations</li><li><span style=\"font-weight: bold; \">Delivery:</span> Implementation of business process workflows to automatically move documents from one step to the next</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Five ways ECM software can benefit your organization</span></h1>\r\n<span style=\"font-weight: bold; \">Basic file sharing and library services.</span> At its core, enterprise document management software begins with basic file sharing and library services managed within a networked repository. Individuals and groups with predefined access rights and permissions can access the repository and then create, read, update and delete files stored within it.\r\nMany ECM applications support Content Management Interoperability Services, an industry standard that allows different vendors' products to interoperate; this is an essential capability within large enterprises that maintain content management tools from multiple vendors.\r\n<span style=\"font-weight: bold; \">Content governance, compliance and records management.</span> For many organizations, managing business documents or other content types is a critical use case for ECM. Companies subject to compliance or other industry regulations need document content management system software to capture, manage, archive and ultimately dispose of files after a predefined period.\r\nECM can ensure that only individuals with predefined permissions - determined by access controls - can update or view documents stored within a repository. An organization can thus manage document modification.\r\nIn addition, enterprise content management tools can log all actions, providing an organization with the capabilities to maintain an auditable record of all the changes to documents within the repository.\r\n<span style=\"font-weight: bold; \">Business process management.</span> Companies also use ECM to establish workflows that span departments and geographies to support extended enterprise and inter-enterprise business processes.\r\nMost ECM software provides tools to help both technical and non-technical business users define business processes. Most applications provide audit controls to track each step of the process and analytic capabilities to help identify inefficiencies and streamline business procedures.\r\n<span style=\"font-weight: bold; \">Content repositories linked to other enterprise applications.</span> Some companies use electronic content management software as a repository for documents created by other enterprise applications, including CRM, ERP, HR and financial systems. These enterprise systems can seamlessly access, view or modify content managed by the ECM.\r\n<span style=\"font-weight: bold; \">Enabling mobile and remote workforces.</span> Content management tools often include functionality to allow remote workers to access content from mobile devices. This is an increasingly important feature for many companies.\r\nMobile capabilities also enable new kinds of data capture and presentation functionalities. By combining content management capabilities with other data, for example, a political canvasser can use a tablet to enter new information about a political donor without having to start from scratch, as some of that information is already stored in a content management system. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/ECM_-_Enterprise_Content_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3408,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg","logo":true,"scheme":false,"title":"McAfee Active Response","vendorVerified":1,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":110,"alias":"mcafee-active-response","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"McAfee Active Response - Comprehensive endpoint detection and response.\r\n<span style=\"color: rgb(97, 97, 97); \">McAfee Active Response delivers continuous detection of and response to advanced security threats to help security practitioners monitor security posture, improve threat detection, and expand incident response capabilities through forward-looking discovery, detailed analysis, forensic investigation, comprehensive reporting, and prioritized alerts and actions.<br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \">McAfee Active Response is proof of the effectiveness of the integrated McAfee security architecture, which is designed to resolve more threats faster and with fewer resources in a more complex world. McAfee Active Response gives you continuous visibility and powerful insights into your endpoints so you can identify breaches faster. And it provides you with the tools you need to correct issues faster and in the way that makes the most sense for your business. All of this power is managed via McAfee® ePolicy Orchestrator® (McAfee ePO™) software leveraging McAfee Data Exchange Layer—this provides unified scalability and extensibility without the need for incremental staff to administer the product.<br /><br /><span style=\"font-weight: bold;\">Key Advantages</span><br /></span>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Automated: Capture and monitor context and system state for changes that may be IoAs, as well as find dormant attack components, and send intelligence to analytics, operations, and forensic teams.</span></li></ul>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Adaptable: When alerted, you can adjust to changes in attack methodologies; automate data collection, alerts, and responses to objects of interest; and customize your configuration to customer workflows.</span></li></ul>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Continuous: Persistent collectors activate triggers on detection of attack events, alerting you and your systems to attack activity that you</span></li></ul>\r\n<span style=\"color: rgb(97, 97, 97); \"><br /><br /><br /><br /></span>\r\n<br /><br />","shortDescription":"McAfee Active Response is a leading innovation in finding and responding to advanced threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Active Response","keywords":"","description":"McAfee Active Response - Comprehensive endpoint detection and response.\r\n<span style=\"color: rgb(97, 97, 97); \">McAfee Active Response delivers continuous detection of and response to advanced security threats to help security practitioners monitor security po","og:title":"McAfee Active Response","og:description":"McAfee Active Response - Comprehensive endpoint detection and response.\r\n<span style=\"color: rgb(97, 97, 97); \">McAfee Active Response delivers continuous detection of and response to advanced security threats to help security practitioners monitor security po","og:image":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg"},"eventUrl":"","translationId":3409,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3410,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg","logo":true,"scheme":false,"title":"McAfee Cloud Workload Security","vendorVerified":1,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":110,"alias":"mcafee-cloud-workload-security","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":" McAfee® Cloud Workload Security (McAfee® CWS) automates the discovery and defense of elastic workloads and containers to eliminate blind spots, deliver advanced threat defense, and simplify multicloud management. McAfee provides protection that makes it possible for a single, automated policy to effectively secure your workloads as they transition through your virtual private, public, and multicloud environments, enabling operational excellence for your cybersecurity teams.\r\n<span style=\"font-weight: bold; \">Automate discovery and deployment</span>\r\nContinuous workload discovery gives you a centralized perspective of all instances across your Amazon Web Services (AWS), Microsoft Azure, and VMware accounts, while automation templates ensure your workloads are protected from the start.\r\n<span style=\"font-weight: bold; \">Visualize and control network threats</span>\r\nTraditional perimeter-based security doesn’t work across hybrid workloads due to their amorphous and decentralized nature. Cloud-native network visualization, prioritized risk alerting, and micro-segmentation deliver awareness and control to prevent both lateral attacks in the data center and external threats\r\n<span style=\"font-weight: bold; \">Defend workloads against advanced attacks</span>\r\nIntegrated countermeasures spanning machine learning, application containment, virtual machine-optimized anti-malware, whitelisting, file integrity monitoring, and micro-segmentation, protect workloads from threats like ransomware and targeted attacks.\r\n<span style=\"font-weight: bold; \">Simplify cloud security management</span>\r\nA single-pane console consolidates security policy and management across physical endpoints, servers, virtual servers and desktops, and hybrid and multi-cloud environments. Isolation allows you to use micro-segmentation to quarantine workloads and containers with a single click.\r\n\r\n<span style=\"font-weight: bold; \">SECURITY BUILD FOR THE CLOUD</span>\r\n<span style=\"text-decoration: underline; \">Cloud and DevOps integration</span>\r\nMcAfee Cloud Workload Security works directly with AWS, Microsoft Azure, and VMware environments to provide continuous visibility, while delivering deployment automation through common DevOps tool support (Chef, Puppet, and shell scripts).\r\n<span style=\"text-decoration: underline; \">Optimized for virtual workloads</span>\r\nLeverage advanced host-based workload defense optimized specifically for virtual instances to avoid resource storms that can strain underlying infrastructure.<br /><br /><span style=\"text-decoration: underline; \">Cloud-native network control</span>\r\nWith increased awareness and control of your cloud workloads you can prevent both lateral attacks in the data center and external threats.<br /><br /><span style=\"text-decoration: underline; \">Cloud provider direct integration</span>\r\nAdditional capabilities are enabled through direct integration with cloud providers such as AWS. For example, AWS GuardDuty alerts integrate directly into McAfee ePO, displaying network connections, port probes, and DNS requests for EC2 instances.\r\n\r\nMcAfee Cloud Workload Security:\r\n<ul><li>McAfee Cloud Workload Security Basic</li></ul>\r\n<ul><li>McAfee Cloud Workload Security Essentials</li></ul>\r\n<ul><li>McAfee Cloud Workload Security Advanced</li></ul>","shortDescription":"McAfee Cloud Workload Security secures your hybrid infrastructure workloads","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Cloud Workload Security","keywords":"","description":" McAfee® Cloud Workload Security (McAfee® CWS) automates the discovery and defense of elastic workloads and containers to eliminate blind spots, deliver advanced threat defense, and simplify multicloud management. McAfee provides protection that makes it ","og:title":"McAfee Cloud Workload Security","og:description":" McAfee® Cloud Workload Security (McAfee® CWS) automates the discovery and defense of elastic workloads and containers to eliminate blind spots, deliver advanced threat defense, and simplify multicloud management. McAfee provides protection that makes it ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg"},"eventUrl":"","translationId":3411,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":5,"title":"Security Software","alias":"security-software","description":" Computer security software or cybersecurity software is any computer program designed to enhance information security. Security software is a broad term that encompasses a suite of different types of software that deliver data and computer and network security in various forms. \r\nSecurity software can protect a computer from viruses, malware, unauthorized users and other security exploits originating from the Internet. Different types of security software include anti-virus software, firewall software, network security software, Internet security software, malware/spamware removal and protection software, cryptographic software, and more.\r\nIn end-user computing environments, anti-spam and anti-virus security software is the most common type of software used, whereas enterprise users add a firewall and intrusion detection system on top of it. \r\nSecurity soft may be focused on preventing attacks from reaching their target, on limiting the damage attacks can cause if they reach their target and on tracking the damage that has been caused so that it can be repaired. As the nature of malicious code evolves, security software also evolves.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Firewall. </span>Firewall security software prevents unauthorized users from accessing a computer or network without restricting those who are authorized. Firewalls can be implemented with hardware or software. Some computer operating systems include software firewalls in the operating system itself. For example, Microsoft Windows has a built-in firewall. Routers and servers can include firewalls. There are also dedicated hardware firewalls that have no other function other than protecting a network from unauthorized access.\r\n<span style=\"font-weight: bold; \">Antivirus.</span> Antivirus solutions work to prevent malicious code from attacking a computer by recognizing the attack before it begins. But it is also designed to stop an attack in progress that could not be prevented, and to repair damage done by the attack once the attack abates. Antivirus software is useful because it addresses security issues in cases where attacks have made it past a firewall. New computer viruses appear daily, so antivirus and security software must be continuously updated to remain effective.\r\n<span style=\"font-weight: bold; \">Antispyware.</span> While antivirus software is designed to prevent malicious software from attacking, the goal of antispyware software is to prevent unauthorized software from stealing information that is on a computer or being processed through the computer. Since spyware does not need to attempt to damage data files or the operating system, it does not trigger antivirus software into action. However, antispyware software can recognize the particular actions spyware is taking by monitoring the communications between a computer and external message recipients. When communications occur that the user has not authorized, antispyware can notify the user and block further communications.\r\n<span style=\"font-weight: bold; \">Home Computers.</span> Home computers and some small businesses usually implement security software at the desktop level - meaning on the PC itself. This category of computer security and protection, sometimes referred to as end-point security, remains resident, or continuously operating, on the desktop. Because the software is running, it uses system resources, and can slow the computer's performance. However, because it operates in real time, it can react rapidly to attacks and seek to shut them down when they occur.\r\n<span style=\"font-weight: bold; \">Network Security.</span> When several computers are all on the same network, it's more cost-effective to implement security at the network level. Antivirus software can be installed on a server and then loaded automatically to each desktop. However firewalls are usually installed on a server or purchased as an independent device that is inserted into the network where the Internet connection comes in. All of the computers inside the network communicate unimpeded, but any data going in or out of the network over the Internet is filtered trough the firewall.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal; \">What is IT security software?</span></h1>\r\nIT security software provides protection to businesses’ computer or network. It serves as a defense against unauthorized access and intrusion in such a system. It comes in various types, with many businesses and individuals already using some of them in one form or another.\r\nWith the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations. Since more and more businesses are now relying their crucial operations on software products, the importance of security system software assurance must be taken seriously – now more than ever. Having reliable protection such as a security software programs is crucial to safeguard your computing environments and data. \r\n<p class=\"align-left\">It is not just the government or big corporations that become victims of cyber threats. In fact, small and medium-sized businesses have increasingly become targets of cybercrime over the past years. </p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal; \">What are the features of IT security software?</span></h1>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Automatic updates. </span>This ensures you don’t miss any update and your system is the most up-to-date version to respond to the constantly emerging new cyber threats.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Real-time scanning.</span> Dynamic scanning features make it easier to detect and infiltrate malicious entities promptly. Without this feature, you’ll risk not being able to prevent damage to your system before it happens.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Auto-clean.</span> A feature that rids itself of viruses even without the user manually removing it from its quarantine zone upon detection. Unless you want the option to review the malware, there is no reason to keep the malicious software on your computer which makes this feature essential.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Multiple app protection.</span> This feature ensures all your apps and services are protected, whether they’re in email, instant messenger, and internet browsers, among others.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application level security.</span> This enables you to control access to the application on a per-user role or per-user basis to guarantee only the right individuals can enter the appropriate applications.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Role-based menu.</span> This displays menu options showing different users according to their roles for easier assigning of access and control.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Row-level (multi-tenant) security.</span> This gives you control over data access at a row-level for a single application. This means you can allow multiple users to access the same application but you can control the data they are authorized to view.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Single sign-on.</span> A session or user authentication process that allows users to access multiple related applications as long as they are authorized in a single session by only logging in their name and password in a single place.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">User privilege parameters.</span> These are customizable features and security as per individual user or role that can be accessed in their profile throughout every application.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application activity auditing.</span> Vital for IT departments to quickly view when a user logged in and off and which application they accessed. Developers can log end-user activity using their sign-on/signoff activities.</li></ul>\r\n<p class=\"align-left\"><br /><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Security_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4956,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IBM_BladeCenter.jpg","logo":true,"scheme":false,"title":"IBM BladeCenter","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":100,"alias":"ibm-bladecenter","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"Introduced in 2002, based on engineering work started in 1999, the IBM BladeCenter was relatively late to the blade server market. It differed from prior offerings in that it offered a range of x86 Intel server processors and input/output (I/O) options. In February 2006, IBM introduced the BladeCenter H with switch capabilities for 10 Gigabit Ethernet and InfiniBand 4X.<br />A web site called Blade.org was available for the blade computing community through about 2009.<br />In 2012 the replacement Flex System was introduced.<br /><span style=\"font-weight: bold;\"><br />IBM BladeCenter (E)</span>\r\nThe original IBM BladeCenter was later marketed as BladeCenter E[3] with 14 blade slots in 7U. Power supplies have been upgraded through the life of the chassis from the original 1200 to 1400, 1800, 2000 and 2320 watt.<br />\r\nThe BladeCenter (E) was co-developed by IBM and Intel and included:\r\n<ul><li>14 blade slots in 7U</li></ul>\r\n<ul><li>Shared media tray with optical drive, floppy drive and USB 1.1 port</li></ul>\r\n<ul><li>One (upgradable to two) management modules</li></ul>\r\n<ul><li>Two (upgradable to four) power supplies</li></ul>\r\n<ul><li>Two redundant high-speed blowers</li></ul>\r\n<ul><li>Two slots for Gigabit Ethernet switches (can also have optical or copper pass-through)</li></ul>\r\n<ul><li>Two slots for optional switch or pass-through modules, can have additional Ethernet, Fibre Channel, InfiniBand or Myrinet 2000 functions.</li></ul>\r\n<br /><span style=\"font-weight: bold;\">IBM BladeCenter T</span><br />\r\nBladeCenter T is the telecommunications company version of the original IBM BladeCenter, available with either AC or DC (48 V) power. Has 8 blade slots in 8U, but uses the same switches and blades as the regular BladeCenter E. To keep NEBS Level 3 / ETSI compliant special Network Equipment-Building System (NEBS) compliant blades are available.<br /><br /><span style=\"font-weight: bold;\">IBM BladeCenter H</span><br />\r\nUpgraded BladeCenter design with high-speed fabric options. Fits 14 blades in 9U. Backwards compatible with older BladeCenter switches and blades.\r\n<ul><li>14 blade slots in 9U</li></ul>\r\n<ul><li>Shared Media tray with Optical Drive and USB 2.0 port</li></ul>\r\n<ul><li>One (upgradable to two) Advanced Management Modules</li></ul>\r\n<ul><li>Two (upgradable to four) Power supplies</li></ul>\r\n<ul><li>Two redundant High-speed blowers</li></ul>\r\n<ul><li>Two slots for Gigabit Ethernet switches (can also have optical or copper pass-through)</li></ul>\r\n<ul><li>Two slots for optional switch or pass-through modules, can have additional Ethernet, Fibre Channel, InfiniBand or Myrinet 2000 functions.</li></ul>\r\n<ul><li>Four slots for optional high-speed switches or pass-through modules, can have 10 Gbit Ethernet or InfiniBand 4X.</li></ul>\r\n<ul><li>Optional Hard-wired serial port capability</li></ul>\r\n<br /><span style=\"font-weight: bold;\">IBM BladeCenter HT</span><br />\r\nBladeCenter HT is the telecommunications company version of the IBM BladeCenter H, available with either AC or DC (48 V) power. Has 12 blade slots in 12U, but uses the same switches and blades as the regular BladeCenter H. But to keep NEBS Level 3 / ETSI compliant special NEBS compliant blades are available.<br /><br /><span style=\"font-weight: bold;\">IBM BladeCenter S</span><br />\r\nTargets mid-sized customers by offering storage inside the BladeCenter chassis, so no separate external storage needs to be purchased. It can also use 110 V power in the North American market, so it can be used outside the datacenter. When running at 120 V , the total chassis capacity is reduced.\r\n<ul><li>6 blade slots in 7U</li></ul>\r\n<ul><li>Shared Media tray with Optical Drive and 2x USB 2.0 ports</li></ul>\r\n<ul><li>Up to 12 hot-swap 3.5" (or 24 2.5") SAS or SATA drives with RAID 0, 1 and 1E capability, RAID 5 and SAN capabilities optional with two SAS RAID controllers</li></ul>\r\n<ul><li>Two optional Disk Storage Modules for HDDs, six 3.5-inch SAS/SATA drives each.</li></ul>\r\n<ul><li>4 hot-swap I/O switch module bays</li></ul>\r\n<ul><li>1 Advanced Management Module as standard (no option for secondary Management Module)</li></ul>\r\n<ul><li>Two 950/1450-watt, hot-swap power modules and ability to have two optional 950/1450-watt power modules, offering redundancy and power for robust configurations.</li></ul>\r\n<ul><li>Four hot-swap redundant blowers, plus one fan in each power supply.</li></ul>","shortDescription":"The IBM BladeCenter was IBM's blade server architecture, until it was replaced by Flex System.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM BladeCenter","keywords":"","description":"Introduced in 2002, based on engineering work started in 1999, the IBM BladeCenter was relatively late to the blade server market. It differed from prior offerings in that it offered a range of x86 Intel server processors and input/output (I/O) options. In Feb","og:title":"IBM BladeCenter","og:description":"Introduced in 2002, based on engineering work started in 1999, the IBM BladeCenter was relatively late to the blade server market. It differed from prior offerings in that it offered a range of x86 Intel server processors and input/output (I/O) options. In Feb","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IBM_BladeCenter.jpg"},"eventUrl":"","translationId":4957,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":517,"title":"Blade System","alias":"blade-system","description":" A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical space and energy. Blade servers have many components removed to save space, minimize power consumption and other considerations, while still having all the functional components to be considered a computer. Unlike a rack-mount server, a blade server needs a blade enclosure, which can hold multiple blade servers, providing services such as power, cooling, networking, various interconnects and management. Together, blades and the blade enclosure form a blade system. Different blade providers have differing principles regarding what to include in the blade itself, and in the blade system as a whole.\r\nIn a standard server-rack configuration, one rack unit or 1U—19 inches (480 mm) wide and 1.75 inches (44 mm) tall—defines the minimum possible size of any equipment. The principal benefit and justification of blade computing relates to lifting this restriction so as to reduce size requirements. The most common computer rack form-factor is 42U high, which limits the number of discrete computer devices directly mountable in a rack to 42 components. Blades do not have this limitation. As of 2014, densities of up to 180 servers per blade system (or 1440 servers per rack) are achievable with blade systems.\r\nEnclosure (or chassis) performs many of the non-core computing services found in most computers. Non-blade systems typically use bulky, hot and space-inefficient components, and may duplicate these across many computers that may or may not perform at capacity. By locating these services in one place and sharing them among the blade computers, the overall utilization becomes higher. The specifics of which services are provided varies by vendor.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Power.</span></span> Computers operate over a range of DC voltages, but utilities deliver power as AC, and at higher voltages than required within computers. Converting this current requires one or more power supply units (or PSUs). To ensure that the failure of one power source does not affect the operation of the computer, even entry-level servers may have redundant power supplies, again adding to the bulk and heat output of the design.\r\nThe blade enclosure's power supply provides a single power source for all blades within the enclosure. This single power source may come as a power supply in the enclosure or as a dedicated separate PSU supplying DC to multiple enclosures. This setup reduces the number of PSUs required to provide a resilient power supply.\r\nThe popularity of blade servers, and their own appetite for power, has led to an increase in the number of rack-mountable uninterruptible power supply (or UPS) units, including units targeted specifically towards blade servers (such as the BladeUPS).\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Cooling.</span></span> During operation, electrical and mechanical components produce heat, which a system must dissipate to ensure the proper functioning of its components. Most blade enclosures, like most computing systems, remove heat by using fans.\r\nA frequently underestimated problem when designing high-performance computer systems involves the conflict between the amount of heat a system generates and the ability of its fans to remove the heat. The blade's shared power and cooling means that it does not generate as much heat as traditional servers. Newer blade-enclosures feature variable-speed fans and control logic, or even liquid cooling systems that adjust to meet the system's cooling requirements.\r\nAt the same time, the increased density of blade-server configurations can still result in higher overall demands for cooling with racks populated at over 50% full. This is especially true with early-generation blades. In absolute terms, a fully populated rack of blade servers is likely to require more cooling capacity than a fully populated rack of standard 1U servers. This is because one can fit up to 128 blade servers in the same rack that will only hold 42 1U rack mount servers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Networking.</span></span> Blade servers generally include integrated or optional network interface controllers for Ethernet or host adapters for Fibre Channel storage systems or converged network adapter to combine storage and data via one Fibre Channel over Ethernet interface. In many blades at least one interface is embedded on the motherboard and extra interfaces can be added using mezzanine cards.\r\nA blade enclosure can provide individual external ports to which each network interface on a blade will connect. Alternatively, a blade enclosure can aggregate network interfaces into interconnect devices (such as switches) built into the blade enclosure or in networking blades.\r\nBlade servers function well for specific purposes such as web hosting, virtualization, and cluster computing. Individual blades are typically hot-swappable. As users deal with larger and more diverse workloads, they add more processing power, memory and I/O bandwidth to blade servers. Although blade server technology in theory allows for open, cross-vendor system, most users buy modules, enclosures, racks and management tools from the same vendor.\r\nEventual standardization of the technology might result in more choices for consumers; as of 2009 increasing numbers of third-party software vendors have started to enter this growing field.\r\nBlade servers do not, however, provide the answer to every computing problem. One can view them as a form of productized server-farm that borrows from mainframe packaging, cooling, and power-supply technology. Very large computing tasks may still require server farms of blade servers, and because of blade servers' high power density, can suffer even more acutely from the heating, ventilation, and air conditioning problems that affect large conventional server farms.","materialsDescription":" <span style=\"font-weight: bold;\">What is blade server?</span>\r\nA blade server is a server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application. The blades are literally servers on a card, containing processors, memory, integrated network controllers, an optional Fiber Channel host bus adaptor (HBA) and other input/output (IO) ports.\r\nBlade servers allow more processing power in less rack space, simplifying cabling and reducing power consumption. According to a SearchWinSystems.com article on server technology, enterprises moving to blade servers can experience as much as an 85% reduction in cabling for blade installations over conventional 1U or tower servers. With so much less cabling, IT administrators can spend less time managing the infrastructure and more time ensuring high availability.\r\nEach blade typically comes with one or two local ATA or SCSI drives. For additional storage, blade servers can connect to a storage pool facilitated by a network-attached storage (NAS), Fiber Channel, or iSCSI storage-area network (SAN). The advantage of blade servers comes not only from the consolidation benefits of housing several servers in a single chassis, but also from the consolidation of associated resources (like storage and networking equipment) into a smaller architecture that can be managed through a single interface.\r\nA blade server is sometimes referred to as a high-density server and is typically used in a clustering of servers that are dedicated to a single task, such as:\r\n<ul><li>File sharing</li><li>Web page serving and caching</li><li>SSL encrypting of Web communication</li><li>The transcoding of Web page content for smaller displays</li><li>Streaming audio and video content</li></ul>\r\nLike most clustering applications, blade servers can also be managed to include load balancing and failover capabilities.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Blade_System.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4962,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IBM_LOGO.png","logo":true,"scheme":false,"title":"IBM POWER8 Server","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":100,"alias":"server-ibm-power8","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"Reflecting the best in open source, big-data computing, IBM POWER8® servers offer the overwhelming processing strength of Linux on IBM Power® and the ability to engage in deep learning.<br />POWER8 servers provide easy-to-deploy cloud solutions and support SAP HANA workloads. POWER8 servers also work in conjunction with IBM Watson® — actually helping to make Watson even smarter.\r\n\r\n<span style=\"font-weight: bold;\">FEATURES</span><br />\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Parallel processing power</span></span><br />\r\nThe POWER8 server delivers parallel processing of data queries, enabling it to resolve queries faster than other processor architectures.<br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\"></span></span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Boosted memory bandwidth</span></span><br />\r\nComputer-assisted personal interface (CAPI) enables the processor to talk directly to the flash drives and use them as an extension of its own memory. The data being cached for in-memory databases can be accessed faster than on any other platform.<br /><br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Complex analytical capabilities </span></span><br />\r\nIBM Watson ingests large amounts of structured and semi-structured data, making it ideal for environments that previously would have taken several data scientists to develop the necessary queries to extract key information from the data. <br /><br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Cost savings with cloud computing</span></span><br />\r\nCompanies can achieve significant cost savings by using cloud computing to help them more intelligently manage, store and access data.<br /><br /><span style=\"font-weight: bold;\">BENEFITS</span><br />\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Gain fast access to Linux compute in the cloud</span></span><br />\r\nEasily extend your current infrastructure into the cloud and get developers up and running on Linux fast. <br /><br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Host data and analytics in Linux</span></span><br />\r\nTest, drive and port data and analytics solutions to Linux. Get a secure environment to prove out performance characteristics for Linux workloads. <br /><br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Integrate hybrid applications</span></span><br />\r\nMaximize performance and efficiency by ensuring systems are close to the data being analyzed. ","shortDescription":"IBM POWER8 servers combine high performance, storage and I/O to focus on increasing volumes of data, while maintaining system speed.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM POWER8 Server","keywords":"","description":"Reflecting the best in open source, big-data computing, IBM POWER8® servers offer the overwhelming processing strength of Linux on IBM Power® and the ability to engage in deep learning.<br />POWER8 servers provide easy-to-deploy cloud solutions and support SAP","og:title":"IBM POWER8 Server","og:description":"Reflecting the best in open source, big-data computing, IBM POWER8® servers offer the overwhelming processing strength of Linux on IBM Power® and the ability to engage in deep learning.<br />POWER8 servers provide easy-to-deploy cloud solutions and support SAP","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IBM_LOGO.png"},"eventUrl":"","translationId":4963,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3449,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg","logo":true,"scheme":false,"title":"McAfee Complete Data Protection","vendorVerified":1,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":110,"alias":"mcafee-complete-data-protection","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<span style=\"color: rgb(97, 97, 97); \">Secure your confidential data with an enterprise-grade security solution that is FIPS 140-2 and Common Criteria EAL2+ certified, and accelerated with the Intel® Advanced Encryption Standard—New Instructions (Intel AES-NI) set. McAfee Complete Data Protection uses drive encryption combined with strong access control via two-factor pre-boot authentication to prevent unauthorized access to confidential data on endpoints, including desktops, virtual desktop infrastructure (VDI) workstations, laptops, Microsoft Windows tablets, USB drives, and more.<br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\">Key Features</span><br />■ Drive encryption<br />■ File and removable media protection<br />■ Management of native encryption<br /><br /><span style=\"font-weight: bold;\">Key Advantages</span><br />■ Stop data loss initiated by sophisticated malware that hijacks sensitive and personal information.<br />■ Secure data when it’s stored on desktops, laptops, tablets, and cloud storage.<br />■ Manage Apple FileVault and Microsoft BitLocker native encryption on endpoints directly from McAfee ePO software.<br />■ Communicate with and take control of your endpoints at the hardware level, whether they are powered off, disabled, or encrypted to halt desk-side visits and endless helpdesk calls due to security incidents, outbreaks, or forgotten encryption passwords.<br />■ Prove compliance with advanced reporting and auditing capabilities and monitor events and generate detailed reports that show auditors and other stakeholders your compliance with internal and regulatory privacy requirements.<br /></span>","shortDescription":"McAfee Complete Data Protection is a comprehensive endpoint encryption solution","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Complete Data Protection","keywords":"","description":"<span style=\"color: rgb(97, 97, 97); \">Secure your confidential data with an enterprise-grade security solution that is FIPS 140-2 and Common Criteria EAL2+ certified, and accelerated with the Intel® Advanced Encryption Standard—New Instructions (Intel AES-NI)","og:title":"McAfee Complete Data Protection","og:description":"<span style=\"color: rgb(97, 97, 97); \">Secure your confidential data with an enterprise-grade security solution that is FIPS 140-2 and Common Criteria EAL2+ certified, and accelerated with the Intel® Advanced Encryption Standard—New Instructions (Intel AES-NI)","og:image":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg"},"eventUrl":"","translationId":3450,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":43,"title":"Data Encryption","alias":"data-encryption","description":"<span style=\"font-weight: bold;\">Data encryption</span> translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext. Currently, encryption is one of the most popular and effective data security methods used by organizations. \r\nTwo main types of data encryption exist - <span style=\"font-weight: bold;\">asymmetric encryption</span>, also known as public-key encryption, and <span style=\"font-weight: bold;\">symmetric encryption</span>.<br />The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. The outdated data encryption standard (DES) has been replaced by modern encryption algorithms that play a critical role in the security of IT systems and communications.\r\nThese algorithms provide confidentiality and drive key security initiatives including authentication, integrity, and non-repudiation. Authentication allows for the verification of a message’s origin, and integrity provides proof that a message’s contents have not changed since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny sending the message.\r\nData protection software for data encryption can provide encryption of devices, email, and data itself. In many cases, these encryption functionalities are also met with control capabilities for devices, email, and data. \r\nCompanies and organizations face the challenge of protecting data and preventing data loss as employees use external devices, removable media, and web applications more often as a part of their daily business procedures. Sensitive data may no longer be under the company’s control and protection as employees copy data to removable devices or upload it to the cloud. As a result, the best data loss prevention solutions prevent data theft and the introduction of malware from removable and external devices as well as web and cloud applications. In order to do so, they must also ensure that devices and applications are used properly and that data is secured by auto-encryption even after it leaves the organization.\r\nEncryption software program encrypts data or files by working with one or more encryption algorithms. Security personnel use it to protect data from being viewed by unauthorized users.\r\nTypically, each data packet or file encrypted via data encryption programs requires a key to be decrypted to its original form. This key is generated by the software itself and shared between the data/file sender and receiver. Thus, even if the encrypted data is extracted or compromised, its original content cannot be retrieved without the encryption key. File encryption, email encryption, disk encryption and network encryption are widely used types of data encryption software.<br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is Encryption software?</span></h1>\r\nEncryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet.There are many software products which provide encryption. Software encryption uses a cipher to obscure the content into ciphertext. One way to classify this type of software is by the type of cipher used. Ciphers can be divided into two categories: <span style=\"font-weight: bold;\">public key ciphers</span> (also known as asymmetric ciphers), and <span style=\"font-weight: bold;\">symmetric key ciphers</span>. Encryption software can be based on either public key or symmetric key encryption.\r\nAnother way to classify crypto software is to categorize its purpose. Using this approach, software encryption may be classified into software which encrypts "<span style=\"font-weight: bold;\">data in transit</span>" and software which encrypts "<span style=\"font-weight: bold;\">data at rest</span>". Data in transit generally uses public key ciphers, and data at rest generally uses symmetric key ciphers.\r\nSymmetric key ciphers can be further divided into stream ciphers and block ciphers. Stream ciphers typically encrypt plaintext a bit or byte at a time, and are most commonly used to encrypt real-time communications, such as audio and video information. The key is used to establish the initial state of a keystream generator, and the output of that generator is used to encrypt the plaintext. Block cipher algorithms split the plaintext into fixed-size blocks and encrypt one block at a time. For example, AES processes 16-byte blocks, while its predecessor DES encrypted blocks of eight bytes.<br />There is also a well-known case where PKI is used for data in transit of data at rest.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">How Data Encryption is used?</span></h1>\r\nThe purpose of data encryption is to deter malicious or negligent parties from accessing sensitive data. An important line of defense in a cybersecurity architecture, encryption makes using intercepted data as difficult as possible. It can be applied to all kinds of data protection needs ranging from classified government intel to personal credit card transactions. Data encryption software, also known as an encryption algorithm or cipher, is used to develop an encryption scheme which theoretically can only be broken with large amounts of computing power.\r\nEncryption is an incredibly important tool for keeping your data safe. When your files are encrypted, they are completely unreadable without the correct encryption key. If someone steals your encrypted files, they won’t be able to do anything with them.\r\nThere different types of encryption: hardware and software. Both offer different advantages. So, what are these methods and why do they matter?\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Software Encryption</span></h1>\r\n<p class=\"align-left\">As the name implies, software encryption uses features of encryption software to encrypt your data. Cryptosoft typically relies on a password; give the right password, and your files will be decrypted, otherwise they remain locked. With encryption enabled, it is passed through a special algorithm that scrambles your data as it is written to disk. The same software then unscrambles data as it is read from the disk for an authenticated user.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Pros.</span>Crypto programs is typically quite cheap to implement, making it very popular with developers. In addition, software-based encryption routines do not require any additional hardware.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Cons.</span>Types of encryption software is only as secure as the rest of your computer or smartphone. If a hacker can crack your password, the encryption is immediately undone.<br />Software encryption tools also share the processing resources of your computer, which can cause the entire machine to slow down as data is encrypted/decrypted. You will also find that opening and closing encrypted files is much slower than normal because the process is relatively resource intensive, particularly for higher levels of encryption</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Hardware encryption</span></h1>\r\n<p class=\"align-left\">At the heart of hardware encryption is a separate processor dedicated to the task of authentication and encryption. Hardware encryption is increasingly common on mobile devices. <br />The encryption protection technology still relies on a special key to encrypt and decrypt data, but this is randomly generated by the encryption processor. Often times, hardware encryption devices replace traditional passwords with biometric logons (like fingerprints) or a PIN number that is entered on an attached keypad<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Pros.</span>Hardware offers strong encryption, safer than software solutions because the encryption process is separate from the rest of the machine. This makes it much harder to intercept or break. </p>\r\n<p class=\"align-left\">The use of a dedicated processor also relieves the burden on the rest of your device, making the encryption and decryption process much faster.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Cons.</span>Typically, hardware-based encrypted storage is much more expensive than a software encryption tools. <br />If the hardware decryption processor fails, it becomes extremely hard to access your information.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">The Data Recovery Challenge. </span>Encrypted data is a challenge to recover. Even by recovering the raw sectors from a failed drive, it is still encrypted, which means it is still unreadable. </p>\r\n<p class=\"align-left\">Hardware encrypted devices don’t typically have these additional recovery options. Many have a design to prevent decryption in the event of a component failure, stopping hackers from disassembling them. The fastest and most effective way to deal with data loss on an encrypted device is to ensure you have a complete backup stored somewhere safe. For your PC, this may mean copying data to another encrypted device. For other devices, like your smartphone, backing up to the Cloud provides a quick and simple economy copy that you can restore from. As an added bonus, most Cloud services now encrypt their users’ data too. <br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Data_Encryption.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":" MDR, which stands for Managed Detection & Response, is an all-encompassing threat detection system, which arose from the need for small/medium-sized organizations who lack resources to be able to monitor their network systems in-house. It provides a cost-effective alternative to SIEM (Security Information and Event Management).\r\nEveryday, the capabilities of attackers get more sophisticated and the volume of alerts becomes overwhelming and unmanageable. In-house teams might struggle to analyze and log data, which makes it harder than ever to determine if these threats are harmful. MDR can put a stop to attacks before they even happen. MDR technology monitors your systems and detects any unusual behavior, whilst our expert team responds to the threats detected within your business.\r\nMDR offers real-time threat intelligence, and is able to analyse behaviour which can be missed by traditional endpoint security technology. MDR also provides rapid identification of known threats, which in turn minimises overall attacks. Having remote incident investigation will minimise damage to your business, and will allow you to get back to work in no time. It’s important to note that using MDR services will allow third party access to your company's data. You need to consider working with a provider who understands and respects your data policy.","materialsDescription":" <span style=\"font-weight: bold;\">What is Managed Detection and Response?</span>\r\nManaged Detection and Response (MDR) is a managed cybersecurity service that provides intrusion detection of malware and malicious activity in your network, and assists in rapid incident response to eliminate those threats with succinct remediation actions. MDR typically combines a technology solution with outsourced security analysts that extend your technologies and team.\r\n<span style=\"font-weight: bold;\">Isn’t that What MSSPs or Managed SIEMs Do?</span>\r\nNo. Managed Security Service Providers (MSSPs) monitor network security controls and may send alerts when anomalies are identified. MSSPs typically do not investigate the anomalies to eliminate false positives, nor do they respond to real threats. This means that abnormalities in network usage are forwarded to your IT personnel who must then dig through the data to determine if there is a real threat and what to do about it.\r\n<span style=\"font-weight: bold;\">Doesn’t My Firewall Protect My Network?</span>\r\nFirewalls and other preventive forms of cybersecurity are very important and effective at preventing basic cyberattacks. However, over the past decade, it has become clear that preventive cybersecurity technologies are not enough to secure an organization’s network. Further, they are yet another source of alerts, log messages, and events that contribute to the “alert fatigue” being universally suffered today. Recent major hacks such as the Marriot Hack of 2018, the Anthem Hack of 2015, and the Target Hack of 2013 demonstrate how easily cybercriminals can breach networks at enterprise organizations to steal millions of credit card numbers, medical records, and other forms of PII/PHI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Endpoint_Detection_and_Response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3456,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg","logo":true,"scheme":false,"title":"McAfee Network Security Platform","vendorVerified":1,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":110,"alias":"mcafee-network-security-platform","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<span style=\"color: rgb(97, 97, 97); \">McAfee® Network Security Platform (McAfee NSP) is a next-generation intrusion prevention system (IPS) that discovers and blocks sophisticated malware threats across the network.<br />It utilizes advanced detection and emulation techniques, moving beyond mere pattern matching to defend against stealthy attacks with a high degree of accuracy. To meet the needs of demanding networks, the platform can scale to more than 40 Gbps with a single device. The integrated McAfee solution portfolio streamlines security operations by combining real-time McAfee Global Threat Intelligence feeds with rich contextual data about users, devices, and applications for fast, accurate response to network-borne attacks.<br /><br /><span style=\"font-weight: bold;\">Key Advantages</span><br />■ Quickly detects and blocks threats to protect applications and data<br />■ High-performance, scalable solution for dynamic environments<br />■ Centralized management for visibility and control<br />■ Advanced detection, including signature-less malware analysis<br />■ Inbound and outbound SSL decryption to inspect network traffic<br />■ High-availability and disaster recovery protection<br />■ Virtual appliances also available<br />■ Integrates with McAfee solution portfolio for device-to-cloud security<br /></span><br />","shortDescription":"McAfee Network Security Platform is a next-generation intrusion prevention system (IPS) that redefines how organizations block advanced threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Network Security Platform","keywords":"","description":"<span style=\"color: rgb(97, 97, 97); \">McAfee® Network Security Platform (McAfee NSP) is a next-generation intrusion prevention system (IPS) that discovers and blocks sophisticated malware threats across the network.<br />It utilizes advanced detection and emu","og:title":"McAfee Network Security Platform","og:description":"<span style=\"color: rgb(97, 97, 97); \">McAfee® Network Security Platform (McAfee NSP) is a next-generation intrusion prevention system (IPS) that discovers and blocks sophisticated malware threats across the network.<br />It utilizes advanced detection and emu","og:image":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg"},"eventUrl":"","translationId":3457,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Data protection and recovery software provide data backup, integrity and security for data backups and it enables timely, reliable and secure backup of data from a host device to destination device. Recently, Data Protection and Recovery Software market are disrupted by innovative technologies such as server virtualization, disk-based backup, and cloud services where emerging players are playing an important role. Tier one players such as IBM, Hewlett Packard Enterprise, EMC Corporation, Symantec Corporation and Microsoft Corporation are also moving towards these technologies through partnerships and acquisitions.\r\nThe major factor driving data protection and recovery software market is the high adoption of cloud-based services and technologies. Many organizations are moving towards the cloud to reduce their operational expenses and to provide real-time access to their employees. However, increased usage of the cloud has increased the risk of data loss and data theft and unauthorized access to confidential information, which increases the demand for data protection and recovery solution suites.","materialsDescription":" \r\n<span style=\"font-weight: bold; \">What is Data recovery?</span>\r\nData recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).\r\nThe most common data recovery scenario involves an operating system failure, malfunction of a storage device, logical failure of storage devices, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the ultimate goal is simply to copy all important files from the damaged media to another new drive. This can be easily accomplished using a Live CD or DVD by booting directly from a ROM instead of the corrupted drive in question. Many Live CDs or DVDs provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioning and consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files.\r\nAnother scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data is not easily read from the media devices. Depending on the situation, solutions involve repairing the logical file system, partition table or master boot record, or updating the firmware or drive recovery techniques ranging from software-based recovery of corrupted data, hardware- and software-based recovery of damaged service areas (also known as the hard disk drive's "firmware"), to hardware replacement on a physically damaged drive which allows for extraction of data to a new drive. If a drive recovery is necessary, the drive itself has typically failed permanently, and the focus is rather on a one-time recovery, salvaging whatever data can be read.\r\nIn a third scenario, files have been accidentally "deleted" from a storage medium by the users. Typically, the contents of deleted files are not removed immediately from the physical drive; instead, references to them in the directory structure are removed, and thereafter space the deleted data occupy is made available for later data overwriting. In the mind of end users, deleted files cannot be discoverable through a standard file manager, but the deleted data still technically exists on the physical drive. In the meantime, the original file contents remain, often in a number of disconnected fragments, and may be recoverable if not overwritten by other data files.\r\nThe term "data recovery" is also used in the context of forensic applications or espionage, where data which have been encrypted or hidden, rather than damaged, are recovered. Sometimes data present in the computer gets encrypted or hidden due to reasons like virus attack which can only be recovered by some computer forensic experts.\r\n<span style=\"font-weight: bold;\">What is a backup?</span>\r\nA backup, or data backup, or the process of backing up, refers to the copying into an archive file of computer data that is already in secondary storage—so that it may be used to restore the original after a data loss event. The verb form is "back up" (a phrasal verb), whereas the noun and adjective form is "backup".\r\nBackups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users; a 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups represent a simple form of disaster recovery and should be part of any disaster recovery plan, backups by themselves should not be considered a complete disaster recovery plan. One reason for this is that not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server by simply restoring data from a backup.\r\nSince a backup system contains at least one copy of all data considered worth saving, the data storage requirements can be significant. Organizing this storage space and managing the backup process can be a complicated undertaking. A data repository model may be used to provide structure to the storage. Nowadays, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.\r\nBefore data are sent to their storage locations, they are selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Every backup scheme should include dry runs that validate the reliability of the data being backed up. It is important to recognize the limitations and human factors involved in any backup scheme.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Protection_and_Recovery_Software__1_.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":" A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.\r\nIn a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source.\r\nA DoS or DDoS attack is analogous to a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter, disrupting trade.\r\nCriminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks or credit card payment gateways. Revenge, blackmail and activism can motivate these attacks. ","materialsDescription":" <span style=\"font-weight: bold;\">What are the Different Types of DDoS Attacks?</span>\r\nDistributed Denial of Service attacks vary significantly, and there are thousands of different ways an attack can be carried out (attack vectors), but an attack vector will generally fall into one of three broad categories:\r\n<span style=\"font-weight: bold;\">Volumetric Attacks:</span>\r\nVolumetric attacks attempt to consume the bandwidth either within the target network/service or between the target network/service and the rest of the Internet. These attacks are simply about causing congestion.\r\n<span style=\"font-weight: bold;\">TCP State-Exhaustion Attacks:</span>\r\nTCP State-Exhaustion attacks attempt to consume the connection state tables which are present in many infrastructure components such as load-balancers, firewalls and the application servers themselves. Even high capacity devices capable of maintaining state on millions of connections can be taken down by these attacks.\r\n<span style=\"font-weight: bold;\">Application Layer Attacks:</span>\r\nApplication Layer attacks target some aspect of an application or service at Layer-7. These are the deadliest kind of attacks as they can be very effective with as few as one attacking machine generating a low traffic rate (this makes these attacks very difficult to proactively detect and mitigate). Application layer attacks have come to prevalence over the past three or four years and simple application layer flood attacks (HTTP GET flood etc.) have been some of the most common denials of service attacks seen in the wild.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DDoS_Protection.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":" MDR, which stands for Managed Detection & Response, is an all-encompassing threat detection system, which arose from the need for small/medium-sized organizations who lack resources to be able to monitor their network systems in-house. It provides a cost-effective alternative to SIEM (Security Information and Event Management).\r\nEveryday, the capabilities of attackers get more sophisticated and the volume of alerts becomes overwhelming and unmanageable. In-house teams might struggle to analyze and log data, which makes it harder than ever to determine if these threats are harmful. MDR can put a stop to attacks before they even happen. MDR technology monitors your systems and detects any unusual behavior, whilst our expert team responds to the threats detected within your business.\r\nMDR offers real-time threat intelligence, and is able to analyse behaviour which can be missed by traditional endpoint security technology. MDR also provides rapid identification of known threats, which in turn minimises overall attacks. Having remote incident investigation will minimise damage to your business, and will allow you to get back to work in no time. It’s important to note that using MDR services will allow third party access to your company's data. You need to consider working with a provider who understands and respects your data policy.","materialsDescription":" <span style=\"font-weight: bold;\">What is Managed Detection and Response?</span>\r\nManaged Detection and Response (MDR) is a managed cybersecurity service that provides intrusion detection of malware and malicious activity in your network, and assists in rapid incident response to eliminate those threats with succinct remediation actions. MDR typically combines a technology solution with outsourced security analysts that extend your technologies and team.\r\n<span style=\"font-weight: bold;\">Isn’t that What MSSPs or Managed SIEMs Do?</span>\r\nNo. Managed Security Service Providers (MSSPs) monitor network security controls and may send alerts when anomalies are identified. MSSPs typically do not investigate the anomalies to eliminate false positives, nor do they respond to real threats. This means that abnormalities in network usage are forwarded to your IT personnel who must then dig through the data to determine if there is a real threat and what to do about it.\r\n<span style=\"font-weight: bold;\">Doesn’t My Firewall Protect My Network?</span>\r\nFirewalls and other preventive forms of cybersecurity are very important and effective at preventing basic cyberattacks. However, over the past decade, it has become clear that preventive cybersecurity technologies are not enough to secure an organization’s network. Further, they are yet another source of alerts, log messages, and events that contribute to the “alert fatigue” being universally suffered today. Recent major hacks such as the Marriot Hack of 2018, the Anthem Hack of 2015, and the Target Hack of 2013 demonstrate how easily cybercriminals can breach networks at enterprise organizations to steal millions of credit card numbers, medical records, and other forms of PII/PHI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Endpoint_Detection_and_Response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5520,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IBM.png","logo":true,"scheme":false,"title":"IBM Proventia Network IPS","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":100,"alias":"ibm-proventia-network-ips","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"The <b>IBM Proventia Network Intrusion Prevention System (IPS)</b> is designed to block Internet threats before they adversely affect your business. This system protects all three network levels: the internal perimeter, the external perimeter, and the remote segments. Featuring proprietary technology that combines performance that matches the speed of data transmission over the network, intelligent security features and multi-level security, IBM Internet Security Systems (ISS) provides proactive protection - protection against the threat before it reaches its goal. \r\n<ul> <li>Performance </li> <li> Security </li> <li> Reliability </li> <li> Implementation </li> <li> Management </li> <li> Confidentiality.</li> </ul>\r\n<b>Do not compromise when it comes to protection or performance</b>\r\nSecurity should increase network performance, not decrease it. The specialized device Proventia Network IPS has high bandwidth, low latency and long uptime, which ensures efficient and safe network operation. It has the following distinctive features:\r\n<ul> <li>Wide bandwidth range (10 Mbps - 5 Gbps) </li> <li> Intelligent in-depth packet inspection using FlowSmart technology </li> <li> Low latency </li> <li> Data transmission in case of system error or power outages</li> </ul>\r\nSecurity is only achieved with proactive protection. The Proventia Network IPS is designed to protect networks from all types of attacks, including: \r\n<ul> <li> Network worms </li> <li> spyware attacks </li> <li> P2P applications </li> <li> denial of service (DOS) and distributed attacks ( DDOS) </li> <li> cross-site scripting </li> <li> SQL injection </li> <li> phishing </li> <li> buffer overflow attacks </li> <li> tracking paths in web server directories</li> </ul>","shortDescription":"Securing networks with the IBM Proventia Network Intrusion Prevention System","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM Proventia Network IPS","keywords":"","description":"The <b>IBM Proventia Network Intrusion Prevention System (IPS)</b> is designed to block Internet threats before they adversely affect your business. This system protects all three network levels: the internal perimeter, the external perimeter, and the remote s","og:title":"IBM Proventia Network IPS","og:description":"The <b>IBM Proventia Network Intrusion Prevention System (IPS)</b> is designed to block Internet threats before they adversely affect your business. This system protects all three network levels: the internal perimeter, the external perimeter, and the remote s","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IBM.png"},"eventUrl":"","translationId":5521,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3217,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/HPE_Apollo_4000.jpg","logo":true,"scheme":false,"title":"HPE Apollo 4000 Systems","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":451,"alias":"hpe-apollo-4000-systems","companyTitle":"Hewlett Packard Enterprise","companyTypes":["supplier","vendor"],"companyId":172,"companyAlias":"hewlett-packard-enterprise","description":"HPE Apollo 4000 systems are specifically optimised to service the data storage-centric workloads that are key to digital transformation – big data analytics and software-defined storage.\r\n<span style=\"font-weight: bold; \">Purpose-built for data storage-centric workloads</span>\r\nSecurely store and efficiently analyse your rapidly growing volumes of data for business value – all while meeting your data centre operations challenges – with Apollo 4000 systems.\r\n\r\n<span style=\"font-weight: bold; \">The Apollo 4000 portfolio</span>\r\nDensity-optimised platforms for data storage-centric workloads\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">HPE Apollo 4200 server</span></span>\r\nThe improved system architecture of this Gen10 server yields accelerated workload performance and enhanced security. The industry’s most versatile 2U platform, it delivers up to 28 LFF or 54 SFF drives in an easily serviceable, standard rack-depth chassis.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">HPE Apollo 4510 system</span></span>\r\nThis system delivers the optimal feature set for enterprise data centre deployments at petabyte scale, including server-based object storage and secondary storage. It accommodates up to 60 LFF drives loaded into two front-accessible drawers for easy serviceability, all in a 4U standard-depth rack.\r\n\r\n<span style=\"font-weight: bold; \">Technical overview</span>\r\n<span style=\"font-weight: bold; \">Form factor</span>\r\n<ul><li>2U chassis (Apollo 4200)</li><li>4U chassis (Apollo 4510)</li></ul>\r\n<span style=\"font-weight: bold; \">Storage</span>\r\n<ul><li>Support for SAS, SATA, NVMe, and SSDs</li><li>Up to 28 LFF and 54 SFF drives in 2U (Apollo 4200)</li><li>Up to 60 LFF drives in 4U (Apollo 4510)</li></ul>\r\n<span style=\"font-weight: bold; \">CPU</span>\r\n<ul><li>Up to 2 Intel Xeon Scalable Processor</li></ul>\r\n<span style=\"font-weight: bold; \">Memory</span>\r\n<ul><li>Up to 1024 GB DDR4 memory (16 DIMMs)</li></ul>\r\n\r\n<br /><span style=\"font-weight: bold;\">HPE Apollo 4000 systems in action:</span>\r\n<span style=\"font-weight: bold;\">Big data and analytics solutions</span>\r\nAccelerate business insights and gain a competitive advantage – choose from multiple, modular Hadoop reference architectures to increase operational efficiencies, influence product development and quality, and securely manage big data workloads.\r\n<span style=\"font-weight: bold;\">General file and object storage</span>\r\nDrive value to your organisation and effectively address unstructured data storage requirements with Apollo-based file and object storage solutions spanning your needs from affordable NAS to durable petabyte-scale storage.\r\n<span style=\"font-weight: bold;\">High-performance computing and AI storage</span>\r\nProviding the necessary high-speed concurrent access to data, HPE offers a comprehensive portfolio of dedicated storage products that enable the full power of HPC by supporting clustered computing and distributed parallel computing.","shortDescription":"Apollo 4000 Systems are the servers and the systems that are purpose-built for big data analytics, software-defined storage, backup and archive, and other data storage-intensive workloads.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"HPE Apollo 4000 Systems","keywords":"","description":"HPE Apollo 4000 systems are specifically optimised to service the data storage-centric workloads that are key to digital transformation – big data analytics and software-defined storage.\r\n<span style=\"font-weight: bold; \">Purpose-built for data storage-centric","og:title":"HPE Apollo 4000 Systems","og:description":"HPE Apollo 4000 systems are specifically optimised to service the data storage-centric workloads that are key to digital transformation – big data analytics and software-defined storage.\r\n<span style=\"font-weight: bold; \">Purpose-built for data storage-centric","og:image":"https://old.roi4cio.com/fileadmin/user_upload/HPE_Apollo_4000.jpg"},"eventUrl":"","translationId":3218,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":519,"title":"Density Optimized Server","alias":"density-optimized-server","description":" The high-density server system is a modern concept of building an economical and scalable computing equipment subsystem within the data processing center (hereinafter referred to as the data center).\r\nThe high-density server system includes server equipment, modules of the organization of network interaction, technologies of resource virtualization and has constructive opportunities to install all the components of a modern data center within a single structural unit (chassis).\r\nThe virtualization tools used and the adaptive management system combines the high-density server system resources for collective use in processing various combinations of workloads.\r\nThe high-density server system in the information system infrastructure allows achieving significant cost savings by compacting components and reducing the number of cable connections, jointly managing systems, using virtualization tools, reducing power and cooling costs, simplifying deployment and the possibility of rapid interchangeability of server equipment.\r\nThe high-density server system can be used as a subsystem of corporate data centers, as well as act as a computing center for an information system of a small company, thanks to its design features and applied technologies.","materialsDescription":" <span style=\"font-weight: bold;\">The High-Density Server System Structure</span>\r\nThe composition of the high-density server system includes:\r\n<ul><li>server equipment;</li><li>interconnect modules;</li><li>software (software);</li><li>management subsystem the high-density server system.</li></ul>\r\nConstructive the high-density server system is designed to install servers of special performance, called the "blade" (from the English "blade"). At the level of the system and application software, the “blade” does not differ from a typical server installed in a standard mounting rack.\r\nSSVP includes a universal chassis with redundant input-output systems, power, cooling and control, as well as blade servers and storage of similar performance. The use of the high-density server system means the provision of a functional management subsystem and services for installation, launch and maintenance.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Density_Optimized_Server.png"},{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4798,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IBM_ds8000.jpg","logo":true,"scheme":false,"title":"IBM System Storage DS8000 series","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":100,"alias":"ibm-system-storage-ds8000-series","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"The IBM System Storage™ DS8000™ series has been enhanced to include IBM System Storage DS8000 Turbo models, which offer even higher performance, higher capacity storage systems that are designed to deliver a generation-skipping leap in performance, scalability, resiliency and total value. Created specifically for the mission-critical workloads of medium and large enterprises, the DS8000 series can help consolidate system storage, support tiered storage requirements, simplify storage management and support system availability to address the needs of businesses operating in an on demand world.\r\nThe DS8000 series is designed to provide exceptional performance while adding virtualization capabilities that can help organizations allocate system resources more effectively and better control application quality of service. \r\nThe DS8000 series offers powerful data backup, remote mirroring and recovery functions that can help protect data from unforeseen events. In addition, the DS8000 supports non-disruptive microcode changes. These functions are designed to help maintain data availability, which can benefit businesses in markets where information must be accessible around the clock, every day of the year. <br /><span style=\"font-weight: bold;\"><br />Features</span>\r\n<ul><li><span style=\"font-weight: bold;\">Performance.</span> The DS8800 delivers better performance with faster controllers, host and device adapters, and 2.5-inch 6 Gb / s Serial Attached SCSI (SAS) hard drives.</li></ul>\r\n<ul><li><span style=\"font-weight: bold;\">Availability and resiliency.</span> More than five nines available based on IBM Power Systems' proven server architecture.</li></ul>\r\n<ul><li><span style=\"font-weight: bold;\">Optimized storage tiers.</span> The IBM System Storage Easy Tier component helps optimize application performance by automatically storing data at appropriate drive levels.</li></ul>\r\n<ul><li><span style=\"font-weight: bold;\">Flexibility.</span> Supporting a wide range of server platforms, hard drive tiers, and application workloads helps ensure cost-effective storage consolidation.</li></ul>","shortDescription":"IBM System Storage DS8000: High-performance disk storage for business-critical enterprise workloads ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM System Storage DS8000 series","keywords":"","description":"The IBM System Storage™ DS8000™ series has been enhanced to include IBM System Storage DS8000 Turbo models, which offer even higher performance, higher capacity storage systems that are designed to deliver a generation-skipping leap in performance, scalability","og:title":"IBM System Storage DS8000 series","og:description":"The IBM System Storage™ DS8000™ series has been enhanced to include IBM System Storage DS8000 Turbo models, which offer even higher performance, higher capacity storage systems that are designed to deliver a generation-skipping leap in performance, scalability","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IBM_ds8000.jpg"},"eventUrl":"","translationId":4799,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":505,"title":"Entry Level Storage","alias":"entry-level-storage","description":" Ready-made entry-level storage systems are often used in various solutions for the SMB segment: disk space consolidation, virtualization, various cluster solutions requiring shared block access.\r\nKey architecture features of most entry-level storage systems on the market:\r\n<ul><li>Use one or two hot-swap controllers that use disk sharing. The controller means a specialized server in a special form factor that provides storage operation (working with disks, servicing arrays and providing volumes to hosts, etc.).</li><li>The presence of two controllers provides an increase in the overall reliability of storage - the ability to avoid downtime during the planned shutdown or failure of one of the controllers) and additional scaling of performance when distributing volumes across different controllers. When using the write cache, its integrity is protected: power protection (regular battery or ionistors plus flash memory reset) and duplication of content between controllers.</li><li>The choice of host interfaces: 16 and 8 Gb FiberChannel, 1 and 10 Gb Ethernet (iSCSI, some models may have FCoE support), SAS. For some models, there are combined options, for example, FC + SAS.</li><li>It is possible to connect additional disk shelves (simple cases with SAS expanders) through the SAS interface. To increase the reliability of the connection, a 2-way connection can be applied (below is an example of one of the possible connection schemes).</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">What Is Entry-Level Storage?</span>\r\nEntry-level flash storage is simple, smart, secure, affordable, high-performance data storage for enterprises to start small and grow with seamless cloud connectivity as business requirements increase.\r\nOrganizations large and small are navigating at a rapid pace of change in a data-driven economy. Delivering data simply, quickly, and cost-effectively is essential to driving business growth, and the hybrid cloud has emerged as the most efficient way to meet changing business needs. Every IT organization is trying to determine how to modernize with hybrid cloud, and all-flash storage systems are critical on-premises to speed up enterprise applications. However, small enterprises have continued to use hard disk storage systems because of the high cost of all-flash solutions.\r\nAn entry-level storage system offers compact, dense, cost-effective, and easy-to-use storage. These storage systems can be deployed in small offices, small enterprises, and remote locations to run both file and block workloads effectively and efficiently. A simple storage system should support multiple protocols, including FC, NFS, SMB/CIFS, iSCSI, and FCoE, to help customers consolidate multiple applications onto a single simple system. It must be easy to install and deploy, secure and provide flexibility to connect to the cloud.\r\nEntry-level flash storage systems help accelerate all applications, consolidate workloads with better user experience, more effective storage and offer the best value to the customer.\r\n<span style=\"font-weight: bold;\">What Are the Benefits of Entry-Level Storage?</span>\r\n The benefits of entry-level storage include:\r\n<ul><li>Improved user experience with fast, secure, and continuous access to data;</li><li>Improved storage efficiency;</li><li>Reduced cost through improved TCO;</li><li>Increased ability for IT to support new business opportunities by leveraging the latest technologies like artificial intelligence (AI), machine learning (ML), deep learning (DL), and cloud.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Entry_Level_Storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5081,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/HP_ProLiant_DL380__DL_380_G5_.jpg","logo":true,"scheme":false,"title":"HP ProLiant DL380 G5","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":451,"alias":"hp-proliant-dl380-g5","companyTitle":"Hewlett Packard Enterprise","companyTypes":["supplier","vendor"],"companyId":172,"companyAlias":"hewlett-packard-enterprise","description":"The new HP ProLiant DL380 (DL 380 G5), the largest server in the world, confirms its reputation as a server with unsurpassed uptime and enterprise-level manageability, high performance of two Intel Xeon processors. With a rack height of only 2U, it is great for deployment in rack-mount infrastructure and various applications.<br /><br />The ProLiant DL380 G5 is based on the platform with the new Intel dual-core Xeon® 5000 and 5100 series processors.<br /><br />The new HP ProLiant DL380, the best-selling server of all, confirms its reputation as a server with unmatched uptime and enterprise-level manageability and high-performance dual Intel Xeon processors. With a rack height of only 2U, it is great for deployment in rack-mount infrastructure and for performing various tasks and applications.<br /><br />HP has refined the core server components with a balanced system architecture that maximizes dual-core processor performance and overall system performance for mission-critical applications and virtual server environments. These enhancements include the new HP Smart Array RAID Controllers and Serial Attached SCSI (SAS) Small Form Factor Drives, feature-rich networking devices, increased memory capacity, and high-speed remote access.<br /><br />The HP Integrated Lights Out 2 (iLO 2) system integrated into the HP ProLiant ProLiant DL380 G5 provides the ability to remotely control the server via LAN or the Internet regardless of the status / performance of the server.<br /><br />The latest generation of servers is based on a platform with the new Intel dual-core processors Xeon® 5000 and 5100 series, which implements a huge number of innovations and modern server technologies:<br />\r\n<ul><li>dual-core processors are manufactured according to the 65-nm process technology and have reduced heat;</li></ul>\r\n<ul><li>two independent memory buses with a total bandwidth of up to 21 GB / s at a frequency of 1333 MHz and up to 17 GB / s at a frequency of 1066 MHz;</li></ul>\r\n<ul><li>Fully buffered memory modules with double-row FBDIMM (Fully Buffered DIMM), providing a new memory interface to accelerate data transfer, as well as increasing signal integrity and error detection;</li></ul>\r\n<ul><li>Intel® I / O Acceleration Technology (Intel® I / OAT), which includes the function of unloading the processor when working with the TCP protocol (TCP Offload Engine) and optimized data flow (optimized data movement) through the platform, which allows the network controller to write data directly to RAM;</li></ul>\r\n<ul><li>Enhanced Intel® Virtualization Technology (Intel® VT) virtualization technology, which simplifies the support of virtual machines (VMs), such as VMware ESX, Microsoft Virtual Server or Xen, and improves their implementation;</li></ul>\r\n<ul><li>PCI-Express I / O support for high-performance communications via Ethernet, RAID, InfiniBand, etc.</li></ul>\r\n<br /><br />","shortDescription":"HP ProLiant DL380 G5 is a server for workgroups in the Rackmount 2U form factor with support for SFF disks and the ability to install up to 2 Intel Xeon processors","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"HP ProLiant DL380 G5","keywords":"","description":"The new HP ProLiant DL380 (DL 380 G5), the largest server in the world, confirms its reputation as a server with unsurpassed uptime and enterprise-level manageability, high performance of two Intel Xeon processors. With a rack height of only 2U, it is great fo","og:title":"HP ProLiant DL380 G5","og:description":"The new HP ProLiant DL380 (DL 380 G5), the largest server in the world, confirms its reputation as a server with unsurpassed uptime and enterprise-level manageability, high performance of two Intel Xeon processors. With a rack height of only 2U, it is great fo","og:image":"https://old.roi4cio.com/fileadmin/user_upload/HP_ProLiant_DL380__DL_380_G5_.jpg"},"eventUrl":"","translationId":5082,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4826,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/HP_ProCurve.PNG","logo":true,"scheme":false,"title":"HP ProCurve Switch 5400zl Series","vendorVerified":0,"rating":"0.00","implementationsCount":3,"suppliersCount":0,"supplierPartnersCount":451,"alias":"hp-procurve-switch-5400zl-series","companyTitle":"Hewlett Packard Enterprise","companyTypes":["supplier","vendor"],"companyId":172,"companyAlias":"hewlett-packard-enterprise","description":"The HP ProCurve Switch 5400zl Series consists of the most advanced intelligent switches in the HP ProCurve product line. The 5400zl series includes 6-slot and 12-slot chassis and associated zl modules and bundles. The foundation for all of these switches is a purpose-built, programmable ProVision ASIC that allows the most demanding networking features, such as Quality of Service (QoS) and security, to be implemented in a scalable yet granular fashion. With 10/100, Gigabit and 10-Gigabit interfaces, integrated PoE+ on 10/100 and 10/100/1000Base-T ports, and a choice of form factors, the 5400zl switches offer excellent investment protection, flexibility, and scalability, as well as ease of deployment, operation, and maintenance.\r\n<span style=\"font-weight: bold;\">Key features</span>\r\n<ul><li>Core, distribution, and advanced access layer</li></ul>\r\n<ul><li>Layer 2 to 4 and intelligent edge feature set</li></ul>\r\n<ul><li>Enterprise-class performance and security</li></ul>\r\n<ul><li>HP ProCurve ONE integrated</li></ul>\r\n<ul><li>Scalable 10/100/1000 and 10-GbE connectivity</li></ul>","shortDescription":"The HP ProCurve Switch 5400zl Series consists of the most advanced intelligent switches in the HP ProCurve product line.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"HP ProCurve Switch 5400zl Series","keywords":"","description":"The HP ProCurve Switch 5400zl Series consists of the most advanced intelligent switches in the HP ProCurve product line. The 5400zl series includes 6-slot and 12-slot chassis and associated zl modules and bundles. The foundation for all of these switches is a ","og:title":"HP ProCurve Switch 5400zl Series","og:description":"The HP ProCurve Switch 5400zl Series consists of the most advanced intelligent switches in the HP ProCurve product line. The 5400zl series includes 6-slot and 12-slot chassis and associated zl modules and bundles. The foundation for all of these switches is a ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/HP_ProCurve.PNG"},"eventUrl":"","translationId":4827,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":513,"title":"Networking","alias":"networking","description":" Networking hardware, also known as network equipment or computer networking devices, are electronic devices which are required for communication and interaction between devices on a computer network. Specifically, they mediate data transmission in a computer network. Units which are the last receiver or generate data are called hosts or data terminal equipment.\r\nNetworking devices may include gateways, routers, network bridges, modems, wireless access points, networking cables, line drivers, switches, hubs, and repeaters; and may also include hybrid network devices such as multilayer switches, protocol converters, bridge routers, proxy servers, firewalls, network address translators, multiplexers, network interface controllers, wireless network interface controllers, ISDN terminal adapters and other related hardware.\r\nThe most common kind of networking hardware today is a copper-based Ethernet adapter which is a standard inclusion on most modern computer systems. Wireless networking has become increasingly popular, especially for portable and handheld devices.\r\nOther networking hardware used in computers includes data center equipment (such as file servers, database servers and storage areas), network services (such as DNS, DHCP, email, etc.) as well as devices which assure content delivery.\r\nTaking a wider view, mobile phones, tablet computers and devices associated with the internet of things may also be considered networking hardware. As technology advances and IP-based networks are integrated into building infrastructure and household utilities, network hardware will become an ambiguous term owing to the vastly increasing number of network capable endpoints.","materialsDescription":" <span style=\"font-weight: bold;\">What is network equipment?</span>\r\nNetwork equipment - devices necessary for the operation of a computer network, for example: a router, switch, hub, patch panel, etc. You can distinguish between active and passive network equipment.\r\n<span style=\"font-weight: bold;\">What is an active network equipment?</span>\r\nActive networking equipment is equipment followed by some “smart” feature. That is, a router, switch (switch), etc. are active network equipment.\r\n<span style=\"font-weight: bold;\">What is passive network equipment?</span>\r\nPassive network equipment - equipment not endowed with "intellectual" features. For example - cable system: cable (coaxial and twisted pair (UTP/STP)), plug / socket (RG58, RJ45, RJ11, GG45), repeater (repeater), patch panel, hub (hub), balun (balun) for coaxial cables (RG-58), etc. Also, passive equipment can include mounting cabinets and racks, telecommunication cabinets.\r\n<span style=\"font-weight: bold;\">What are the main network components?</span>\r\nThe main components of the network are workstations, servers, transmission media (cables) and network equipment.\r\n<span style=\"font-weight: bold;\">What are workstations?</span>\r\nWorkstations are network computers where network users implement application tasks.\r\n<span style=\"font-weight: bold;\">What are network servers?</span>\r\nNetwork servers - hardware and software systems that perform the functions of controlling the distribution of network shared resources. A server can be any computer connected to the network on which the resources used by other devices on the local network are located. As the server hardware, fairly powerful computers are used.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Networking.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4840,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IBM_Power_770.jpg","logo":true,"scheme":false,"title":"IBM Power 770","vendorVerified":0,"rating":"0.00","implementationsCount":3,"suppliersCount":0,"supplierPartnersCount":100,"alias":"ibm-power-770","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"Everyone knows what “performance” meant for IT in the past. But the IT landscape is evolving rapidly. And, as processes become more interrelated and complex, IT is being called upon to solve challenging new problems—and implement new projects, both with higher service levels and in a more cost effective manner. IBM has the systems, software and expertise to help clients implement projects that make their IT an enabler of innovation and a catalyst for business change in this new world of critical information.\r\nToday’s IT performance means delivering services faster, with higher quality and with superior economics. The emerging measures of IT performance are around agility and the ability to help the business capitalize on new opportunities. IT is measured on providing an infrastructure that can handle rapid growth and manage business risk while meeting higher required service levels. And of course it is expected that new services will be delivered within tighter budget constraints—with IT expected to do more with less and find the most efficient solutions possible.<br />\r\nDesigned for virtualized consolidation of business-critical workloads, the IBM® Power® 770 delivers on performance, availability, efficiency and virtualization in a way that is unique in the industry. PowerVM® virtualization enables continuous, dynamic resource adjustments across all partitions and operating environments to optimize performance and enable higher utilization levels while optimizing energy usage. Supported environments include AIX®, IBM i, Linux for Power applications, all on the same system.<br />\r\nEver increasing numbers of IBM Power clients are reporting enormous savings from faster provisioning using cloud enabled technologies. Of course this comes in addition to the more traditional savings of reduced software costs, energy, floor space and administrative overhead. Additional benefits include increased application performance, operational availability and security that can only come from IBM. All of this is delivered on the latest technology from a vendor you can trust. No wonder more and more companies are switching to IBM Power Systems™.<br />For database serving, the Power 770 provides a system designed for demanding, critical, cloud-enabled workloads. Demonstrating outstanding performance across multiple database solutions and multiple operating systems, the Power 770 shows its true heart and soul when entrusted with a company’s most treasured IT asset, the database of critical information.<br />\r\nFor transaction processing workloads, the IBM Power 770 server delivers outstanding performance, mainframe-inspired reliability, modular nondisruptive growth and innovative virtualization technologies. These features are integrated to enable the simplified management of growth, complexity and risk.<br />\r\nFor complete business system needs, the Power 770 provides a unique combination of performance across multiple workloads and availability features to keep your business running. In addition, PowerVM virtualization helps to maximize your efficiency and nondisruptive growth options are designed to keep your costs in line with your business. With all this coming together in one integrated energy-saving package, the Power 770 makes a great business solution.<br />\r\nAvailable in configurations up to 64 POWER7+ processor cores, this new version of the popular modular design delivers more capacity with more efficiency than ever before. The result is more performance per system, more performance per footprint, and best of all, more performance per watt. This innovative design approach also enables near-linear scaling and nondisruptive growth while maximizing your investment. POWER7+ technology, PowerVM virtualization and the Power 770—the ideal combination for your IT environment.<br /><br /><span style=\"font-weight: bold;\">Highlights</span>\r\n<ul><li>Cloud enabled for fast implementation of new workloads</li></ul>\r\n<ul><li>Designed for secure, application availability</li></ul>\r\n<ul><li>Modular, economically efficient design</li></ul>\r\n<ul><li>Virtualized from within for better integration</li></ul>\r\n<ul><li>Supports your growth, without disrupting your business</li></ul>","shortDescription":"IBM Power 770 server: Reliable, secure systems for your critical information","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM Power 770","keywords":"","description":"Everyone knows what “performance” meant for IT in the past. But the IT landscape is evolving rapidly. And, as processes become more interrelated and complex, IT is being called upon to solve challenging new problems—and implement new projects, both with higher","og:title":"IBM Power 770","og:description":"Everyone knows what “performance” meant for IT in the past. But the IT landscape is evolving rapidly. And, as processes become more interrelated and complex, IT is being called upon to solve challenging new problems—and implement new projects, both with higher","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IBM_Power_770.jpg"},"eventUrl":"","translationId":4841,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5609,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/HPE_logo.jpeg","logo":true,"scheme":false,"title":"HPE 3PAR Thin Suite","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":451,"alias":"hpe-3par-thin-suite","companyTitle":"Hewlett Packard Enterprise","companyTypes":["supplier","vendor"],"companyId":172,"companyAlias":"hewlett-packard-enterprise","description":"<span style=\"font-weight: bold; \">HPE 3PAR Thin Suite</span> offers the industry’s most comprehensive tools for thin storage. Thin Suite combines industry-leading HPE 3PAR <span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Thin Provisioning, Thin Conversion</span></span>, and <span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Thin Persistence Software</span></span> in a single suite. HPE 3PAR Thin Provisioning Software increases storage system efficiency and optimizes capacity utilization. It does this by addressing the problem of capacity over-allocation through eliminating the need to dedicate storage capacity up-front. With HPE 3PAR Thin Conversion Software, a technology refresh now offers the opportunity to reduce capacity requirements by up to 60 percent – simply and rapidly. HPE 3PAR Thin Persistence Software ensures that thin volumes on HPE 3PAR Storage System stay as lean and efficient as possible by reclaiming unused space associated with deleted data. Thin Suite enables users to not only save money on up-front capacity purchases, but to remain cost- and energy-efficient over time by ensuring that thin storage stays thin.\r\n<span style=\"text-decoration: underline;\"><span style=\"font-weight: bold;\">Key Features:</span></span>\r\n<ul><li>HPE 3PAR Thin Provisioning Software Reduces Capital Expenditure for Storage and Enables Green IT.</li><li>Thin Provisioning Reduces Operating Expenditures by Making Storage More Agile and Efficient.</li><li>HPE 3PAR Thin Conversion Software Drives up Storage Efficiency, Simply and Rapidly.</li><li>HPE 3PAR Thin Persistence Software Preserves High Capacity Utilization Levels Over Time.</li></ul>","shortDescription":"Thin Suite enables users to not only save money on up-front capacity purchases, but to remain cost- and energy-efficient over time by ensuring that thin storage stays thin.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"HPE 3PAR Thin Suite","keywords":"","description":"<span style=\"font-weight: bold; \">HPE 3PAR Thin Suite</span> offers the industry’s most comprehensive tools for thin storage. Thin Suite combines industry-leading HPE 3PAR <span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Thin Provisioning, ","og:title":"HPE 3PAR Thin Suite","og:description":"<span style=\"font-weight: bold; \">HPE 3PAR Thin Suite</span> offers the industry’s most comprehensive tools for thin storage. Thin Suite combines industry-leading HPE 3PAR <span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Thin Provisioning, ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/HPE_logo.jpeg"},"eventUrl":"","translationId":5610,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":315,"title":"Storage Device Management Software","alias":"storage-device-management-software","description":"Storage management refers to activities undertaken by IT managers and administrators to achieve storage infrastructures' accessibility, reliability, recoverability, and optimal performance.\r\nDespite the significant advantages resulting from the consolidation of data storage in modern computing systems, there are at least two fundamental problems of data storage management - high cost and inefficient use. Even if the cost of disk memory is reduced by an average of 30% per year, the demand for it increases by 100% during the same time, so the total amount of data storage costs will grow by 40%. The fact that memory is used inefficiently has a sensitive effect on meager IT budgets. So is it possible to control disk assets in order to get the most return on investment?\r\nPositive answers to these questions are provided by the storage resource management system. For example, what should an administrator do if he is responsible for accessing data at the bank if customer service is suspended at the very height of the trading day due to slow application performance? One of the probable reasons is that the disk space required by the application is almost exhausted. How quickly does the network administrator identify the true cause of the collapse? Could he have foreseen and prevented her? If it was possible to set a threshold for the acceptable size of free disk space in the relevant rules, he would have received a notification in advance that the file system was about to begin to run out of disk space, and would be able to take appropriate measures in time.\r\nStorage networks today require constant high availability - a good reason to use monitoring systems and analysis tools not only when a problem has already arisen. In addition, a comprehensive overview of the storage network is usually required.\r\nIn large data centers, managing drives is significantly more expensive than acquiring them. When using, in particular, SAN, thanks to centralized administration and management through switches and directors, it was already possible to significantly save on management. With scalable storage capacity in SANs, high availability and performance make it easy to provide and manage bulk storage in large data centers. However, increasing capacity, increasing data transfer rates, heterogeneous equipment from different manufacturers and virtualization technologies make monitoring the structure of storage networks and analyzing internal processes more and more difficult. Obviously, for the network administrator, they create new difficulties, which in professional jargon are called "network blindness." By this we mean the inability to diagnose, analyze and prevent failures, and, in addition, complex protocols and structures reduce network performance.\r\nOvercoming “blindness” is of great practical importance. Many companies risk significant damage already in the first four hours after the failure, and the loss of enterprises specializing, for example, in electronic commerce and financial institutions, reaches hundreds of thousands or even several million dollars per hour. These figures once again convince us that there is a need to respond very quickly to failures and performance problems.","materialsDescription":"<span style=\"font-weight: bold;\">Storage device management utilities</span>\r\n<ul><li>Backup software makes copies of all information stored on a disk and restores either the entire disk (aka Disk cloning) in an event of disk failure or selected files that are accidentally deleted or corrupted. Undeletion utilities are sometimes more convenient.</li><li>Disk checkers scan an operating hard drive and check for logical (filesystem) or physical errors.</li><li>Disk compression utilities transparently compress/uncompress the contents of a disk, increasing the capacity of the disk.</li><li>Disk defragmenters detect computer files whose contents are scattered across several locations on the hard disk and collect the fragments into one contiguous area.</li><li>Disk formatters prepare a data storage device such as a hard disk, solid-state drive, floppy disk or USB flash drive for initial use. These are often used to permanently erase an entire device.</li><li>Disk partition editors divide an individual drive into multiple logical drives, each with its own file system which can be mounted by the operating system and treated as an individual drive.</li><li>Disk space analyzers provide a visualization of disk space usage by getting the size for each folder (including sub folders) and files in folder or drive. showing the distribution of the used space.</li><li>Tape initializers write a label to a magnetic tape or other magnetic medium. Initializers for DECtape formatted the tape into blocks.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_Device_Management_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4844,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/HPE_logo.jpeg","logo":true,"scheme":false,"title":"HPE StoreVirtual VSA Software","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":451,"alias":"hpe-storevirtual-vsa-software","companyTitle":"Hewlett Packard Enterprise","companyTypes":["supplier","vendor"],"companyId":172,"companyAlias":"hewlett-packard-enterprise","description":"For developing converged compute and storage solutions in virtualized environments, HPE StoreVirtual VSA Software delivers high performance shared storage on your choice of servers and SSD or HDD media. Built on proven data services technology, HPE StoreVirtual VSA delivers software-defined storage by virtualizing up to 50TB of disk capacity per server running VMware vSphere, Microsoft Hyper-V or Linux KVM. The HPE StoreVirtual VSA eliminates the need for external shared storage required to implement advanced hypervisor features.\r\nHPE StoreVirtual VSA uses scale-out, distributed clustering to provide a pool of storage with enterprise storage features and simple management at reduced cost. Multiple StoreVirtual VSAs running on multiple servers create a clustered pool of storage with the ability to make data highly available by protecting volumes with Network RAID. Adding more StoreVirtual VSAs to the cluster grows the storage pool. With Network RAID, blocks of data are striped and mirrored across multiple StoreVirtual VSAs, allowing volumes and applications to stay online in the event of disk, storage subsystem or server failure. iSCSI connectivity on HPE StoreVirtual VSA supports the use of the storage pools by hypervisors as well as other applications. HPE StoreVirtual VSA fully supports 1GbE and 10GbE environments for connections to both virtual and physical hosts.<br />\r\nLeverage existing converged infrastructure with StoreVirtual VSA and enable higher levels of protection for business critical data services. Easy to use installation wizards assist in the deployment of HPE StoreVirtual VSA on VMware vSphere or Microsoft HyperV. Using the Centralized Management Console, StoreVirtual VSA can be deployed at remote sites and managed centrally as a virtual storage system.<br /><br /><span style=\"font-weight: bold;\">Benefits</span>\r\n<ul><li>Gain the benefits of an array without requiring a physical storage infrastructure by virtualizing storage resources in a server – reduces cost, footprint, power and cooling</li></ul>\r\n<ul><li>Take advantage of hypervisor advanced features such as vMotion and Live Migration without purchasing external storage system</li></ul>\r\n<ul><li>Create a storage pool which is available to hypervisors and other applications via iSCSI</li></ul>\r\n<ul><li>Comes complete with all storage management features - no additional software needed</li></ul>\r\n<ul><li>Easily build a clustered, highly available converged storage pool on existing servers</li></ul>\r\n<ul><li>Utilize internal (SATA, MDL, SAS, SSD, PCIe Flash) and external (iSCSI, FC, SAS) storage options supported by VMware, Microsoft or Linux as back end storage</li></ul>\r\n<ul><li>Enable disaster recovery (DR) solutions for remote or branch offices that do not have budget, space, or power for servers and a traditional array</li></ul>\r\n<ul><li>Easily replicate volumes between StoreVirtual VSA and 3PAR with Peer Copy</li></ul>\r\n<ul><li>Reduce cost and complexity with integrated backup to HPE StoreOnce systems using HPE RMC software</li></ul>","shortDescription":"The StoreVirtual VSA software delivers the scalability and high availability of HP StoreVirtual arrays to small and midsize customers.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"HPE StoreVirtual VSA Software","keywords":"","description":"For developing converged compute and storage solutions in virtualized environments, HPE StoreVirtual VSA Software delivers high performance shared storage on your choice of servers and SSD or HDD media. Built on proven data services technology, HPE StoreVirtua","og:title":"HPE StoreVirtual VSA Software","og:description":"For developing converged compute and storage solutions in virtualized environments, HPE StoreVirtual VSA Software delivers high performance shared storage on your choice of servers and SSD or HDD media. Built on proven data services technology, HPE StoreVirtua","og:image":"https://old.roi4cio.com/fileadmin/user_upload/HPE_logo.jpeg"},"eventUrl":"","translationId":4845,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":1,"title":"Desktop virtualization","alias":"desktop-virtualization","description":" Desktop virtualization is a virtualization technology that separates an individual's PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.\r\nDesktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.\r\nDesktop virtualization has many benefits, including a lower total cost of ownership (TCO), increased security, reduced energy costs, reduced downtime and centralized management.\r\nLimitations of desktop virtualization include difficulty in maintenance and set up of printer drivers; increased downtime in case of network failures; complexity and costs involved in VDI deployment and security risks in the event of improper network management.<br /><br />","materialsDescription":" <span style=\"font-weight: bold; \">What are types of desktop virtualization technologies?</span>\r\nHost-based forms of desktop virtualization require that users view and interact with their virtual desktops over a network by using a remote display protocol. Because processing takes place in a data center, client devices can be traditional PCs, but also thin clients, zero clients, smartphones and tablets. Examples of host-based desktop virtualization technology include:\r\n<span style=\"font-weight: bold; \">Host-based virtual machines:</span> Each user connects to an individual VM that is hosted in a data center. The user may connect to the same VM every time, allowing for personalization (known as a persistent desktop), or be given a fresh VM at each login (a nonpersistent desktop).\r\n<span style=\"font-weight: bold; \">Shared hosted:</span> Users connect to a shared desktop that runs on a server. Microsoft Remote Desktop Services, formerly Terminal Services, takes this client-server approach. Users may also connect to individual applications running on a server; this technology is an example of application virtualization.\r\n<span style=\"font-weight: bold; \">Host-based physical machines:</span> The operating system runs directly on another device's physical hardware.\r\nClient virtualization requires processing to occur on local hardware; the use of thin clients, zero clients and mobile devices is not possible. These types of desktop virtualization include:\r\n<span style=\"font-weight: bold; \">OS image streaming:</span> The operating system runs on local hardware, but it boots to a remote disk image across the network. This is useful for groups of desktops that use the same disk image. OS image streaming, also known as remote desktop virtualization, requires a constant network connection in order to function.\r\n<span style=\"font-weight: bold; \">Client-based virtual machines:</span> A VM runs on a fully functional PC, with a hypervisor in place. Client-based virtual machines can be managed by regularly syncing the disk image with a server, but a constant network connection is not necessary in order for them to function.\r\n<span style=\"font-weight: bold;\">Desktop virtualization vs. virtual desktop infrastructure</span>\r\nThe terms <span style=\"font-style: italic;\">desktop virtualization</span> and virtual desktop infrastructure (VDI) are often used interchangeably, but they are not the same. While VDI is a type of desktop virtualization, not all desktop virtualization uses VDI.\r\nVDI refers to the use of host-based VMs to deliver virtual desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology. Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- are not examples of VDI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_virtualization.png"},{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1883,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Bell_Integrator.png","logo":true,"scheme":false,"title":"Bell Integrator Software Development","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"bell-integrator-software-development","companyTitle":"Bell Integrator","companyTypes":["supplier"],"companyId":641,"companyAlias":"bell-integrator","description":"Always in close collaboration with our customer, we'll start with the product definition. From there we develop the technical specifications, and handle the implementation, integration software development and testing of the finished product. And every project comes with a comprehensive set documentation.\r\nBell Integrator has international quality certificate ISO 9001-2011 and offers a professional approach to software development and management using modern technical infrastructure and advanced design tools.\r\nBell integrator use the adopt Scrum Framework as part of Agile Methodology mostly preferred for complex products with high level of possible changes within development and implementation phases. The model brings a dedicated team of engineers to define, develop, test and deploy the solution in small Sprints of 2-4 weeks which are designed to bring rapid development/","shortDescription":"Bell Integrator offers a full suite of software development and management services.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Bell Integrator Software Development","keywords":"","description":"Always in close collaboration with our customer, we'll start with the product definition. From there we develop the technical specifications, and handle the implementation, integration software development and testing of the finished product. And every project","og:title":"Bell Integrator Software Development","og:description":"Always in close collaboration with our customer, we'll start with the product definition. From there we develop the technical specifications, and handle the implementation, integration software development and testing of the finished product. And every project","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Bell_Integrator.png"},"eventUrl":"","translationId":1884,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":601,"title":"Custom Software Development","alias":"custom-software-development","description":" Custom software (also known as bespoke software or tailor-made software) is software that organization for some specific organization or another user. As such, it can be contrasted with the use of software packages developed for the mass market, such as commercial off-the-shelf (COTS) software, or existing free software.\r\nSince custom software is developed for a single customer it can accommodate that customer's particular preferences and expectations. Custom software may be developed in an iterative process, allowing all nuances and possible hidden risks to be taken into account, including issues which were not mentioned in the original requirement specifications (which are, as a rule, never perfect). In particular, the first phase in the software development process may involve many departments, materchode including marketing, engineering, research and development and general management.\r\nLarge companies commonly use custom software for critical functions, including content management, inventory management, customer management, human resource management, or otherwise to fill the gaps present in the existing software packages. Often such software is legacy software, developed before COTS or free software packages offering the required functionality became available.\r\nCustom software development is often considered expensive compared to off-the-shelf solutions or products. This can be true if one is speaking of typical challenges and typical solutions. However, it is not always true. In many cases, COTS software requires customization to correctly support the buyer's operations. The cost and delay of COTS customization can even add up to the expense of developing custom software. Cost is not the only consideration, however, as the decision to opt for custom software often includes the requirement for the purchaser to own the source code, to secure the possibility of future development or modifications to the installed system.\r\nAdditionally, COTS comes with upfront license costs which vary enormously but sometimes run into the millions (in terms of dollars). Furthermore, the big software houses that release COTS products revamp their product very frequently. Thus a particular customization may need to be upgraded for compatibility every two to four years. Given the cost of customization, such upgrades also turn out to be expensive, as a dedicated product release cycle will have to be earmarked for them.\r\nThe decision to build custom software or go for a COTS implementation would usually rest on one or more of the following factors:\r\n<ul><li>Finances - both cost and benefit: The upfront license cost for COTS products mean that a thorough cost-benefit analysis of the business case needs to be done. However it is widely known that large custom software projects cannot fix all three of scope, time/cost and quality constant, so either the cost or the benefits of a custom software project will be subject to some degree of uncertainty - even disregarding the uncertainty around the business benefits of a feature that is successfully implemented.</li><li>Supplier - In the case of COTS, is the supplier likely to remain in business long, and will there be adequate support and customization available? Alternatively, will there be a realistic possibility of getting support and customization from third parties? In the case of custom software, software development may be outsourced or done in-house. If it is outsourced, the question is: is the supplier reputable, and do they have a good track record?</li><li>Time to market: COTS products usually have a quicker time to market</li><li>Size of implementation: COTS comes with standardization of business processes and reporting. For a global or national organization, these can bring in gains in cost savings, efficiency and productivity, if the branch offices are all willing and able to use the same COTS without heavy customizations (which is not always a given).</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">Why is custom software such a large investment?</span>\r\nBuilding a custom web application is a time-consuming endeavor. It takes time to learn the processes of your business, to gather requirements, to flesh out your needs, and to build the software. Put simply, time is money.\r\nWhile it’s a large investment, by investing in custom software, you’ll own the code instead of having a long-term licensing agreement with another software company.\r\n<span style=\"font-weight: bold;\">How could my business benefit from custom software?</span>\r\nA custom business software solution increases process efficiency through process automation. When business processes are properly automated, they minimize the waste in time and resources that the original processes contained.\r\nThink of it this way: with software that already exists, you have to modify your process to meet software capabilities. With custom software, you can build a system around the existing processes you have in place. You took a lot of time to develop those processes, so why should you revamp your business?\r\n<span style=\"font-weight: bold;\">What is IP and how important is it that I own it?</span>\r\nIP stands for Intellectual Property. When you deal with anything creative, you have to think about copyright and the intellectual property on that work and that includes the creation of software code.\r\nThis gets back to the question of buying vs. building. If there is an existing solution that can suit your needs just fine, then it makes sense to buy, but the software developer owns the code and you are basically licensing the software from there. However, if you need a specialized solution that is customized to your needs and decide to go the custom development route, then the question of who owns the code is an important one.\r\n<span style=\"font-weight: bold;\">I’m thinking about hiring someone offshore; what should I watch out for?</span>\r\nIn short, everything. Language barriers and lack of proximity lead to breakdowns in communication and quality. Do yourself a favor and stay local.\r\nOn a related note, if you’re thinking about hiring for the position internally, think about this: it takes around three people to complete a successful custom software project. If you hire someone internally, their salary might cost what it would take to build with us, and you get a whole team when you work with us. Plus, if your software developer decides to leave, they take their knowledge with them. If one of our team members leave, our whole team shares the knowledge so you’re not left in the dark.\r\n<span style=\"font-weight: bold;\">If things don’t go well, am I sunk?</span>\r\nWe make communication and transparency are top priorities so this doesn’t happen. Right out of the gate we work hard to make sure that not only the project is a good fit, but the relationship with the client is as well. Through each step of the process and the build, we keep you in the loop weekly so you know what to expect and what is happening, but a good development company should have places in their process/relationship where you can cleanly exit. Make sure you know what the process is for leaving and what those different ‘leaving’ options are.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Custom_Software_Development.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1537,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Untitled-2-300x200.png","logo":true,"scheme":false,"title":"IBM Cloud Object Storage","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":100,"alias":"ibm-cloud-object-storage","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"<h1 id=\"ibm-pagetitle-h1\">IBM Cloud Object Storage is</h1>\r\n<p>a highly scalable cloud storage service, designed for high durability, resiliency and security. <span style=\"color: #323232; font-family: ibm-plex-sans, 'Helvetica Neue', Arial, sans-serif; font-size: 16px; background-color: #f4f4f4;\">Designed for data durability of 99.999999999 percent. Data is sliced, and slices are dispersed across multiple devices in multiple facilities for resiliency. High data durability is maintained by built-in integrity checking and self-repair capabilities.</span> <span style=\"color: #323232; font-family: ibm-plex-sans, 'Helvetica Neue', Arial, sans-serif; font-size: 16px; background-color: #f4f4f4;\">Data at rest is secured using server-side encryption and data in motion is secured using carrier-grade TLS/SSL. Gain additional control with role-based policies and use IBM Cloud Identity & Access Management to set bucket-level permissions.</span></p>","shortDescription":"Get your data to the cloud faster, analyze it in place, archive it for less.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM Cloud Object Storage","keywords":"","description":"<h1 id=\"ibm-pagetitle-h1\">IBM Cloud Object Storage is</h1>\r\n<p>a highly scalable cloud storage service, designed for high durability, resiliency and security. <span style=\"color: #323232; font-family: ibm-plex-sans, 'Helvetica Neue', Arial, sans-serif; font-si","og:title":"IBM Cloud Object Storage","og:description":"<h1 id=\"ibm-pagetitle-h1\">IBM Cloud Object Storage is</h1>\r\n<p>a highly scalable cloud storage service, designed for high durability, resiliency and security. <span style=\"color: #323232; font-family: ibm-plex-sans, 'Helvetica Neue', Arial, sans-serif; font-si","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Untitled-2-300x200.png"},"eventUrl":"","translationId":1538,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[{"id":24,"title":"IaaS - storage"}],"testingArea":"","categories":[{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}