{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"de":"die produkte","ru":"Продукты","_type":"localeString","en":"Products"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"en":"partners","ru":"партнеры","_type":"localeString"},"update-profile-button":{"ru":"Обновить профиль","_type":"localeString","en":"Update profile"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"ru":"Компетенции","_type":"localeString","en":"Categories"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"role-user":{"_type":"localeString","en":"User","ru":"Пользователь"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 reference"},"partner-status":{"_type":"localeString","en":"Partner status","ru":"Статус партнёра"},"country":{"ru":"Страна","_type":"localeString","en":"Country"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"_type":"localeString","en":"branch","ru":"область деятельности"},"employees-popover":{"en":"number of employees","ru":"количество сотрудников","_type":"localeString"},"partnership-programme":{"ru":"Партнерская программа","_type":"localeString","en":"Partnership program"},"partner-discounts":{"_type":"localeString","en":"Partner discounts","ru":"Партнерские скидки"},"registered-discounts":{"ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString","en":"Additional benefits for registering a deal"},"additional-advantages":{"en":"Additional Benefits","ru":"Дополнительные преимущества","_type":"localeString"},"additional-requirements":{"en":"Partner level requirements","ru":"Требования к уровню партнера","_type":"localeString"},"certifications":{"_type":"localeString","en":"Certification of technical specialists","ru":"Сертификация технических специалистов"},"sales-plan":{"_type":"localeString","en":"Annual Sales Plan","ru":"Годовой план продаж"},"partners-vendors":{"ru":"Партнеры-производители","_type":"localeString","en":"Partners-vendors"},"partners-suppliers":{"ru":"Партнеры-поставщики","_type":"localeString","en":"Partners-suppliers"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"en":"Produced products","ru":"Производимые продукты","_type":"localeString"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"en":"Supplied deployments","ru":"Поставляемые внедрения","_type":"localeString"},"show-all":{"ru":"Показать все","_type":"localeString","en":"Show all"},"not-yet-converted":{"_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время."},"schedule-event":{"_type":"localeString","en":"Events schedule","ru":"Pасписание событий"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"register":{"ru":"Регистрация ","_type":"localeString","en":"Register"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"auth-message":{"_type":"localeString","en":"To view company events please log in or register on the sit.","ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт."},"company-presentation":{"ru":"Презентация компании","_type":"localeString","en":"Company presentation"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"de":"roi4presenter","ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"_type":"localeString","en":"Received ROI","ru":"Полученный ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"title":{"_type":"localeString","en":"ROI4CIO: Company","ru":"ROI4CIO: Компания"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"translations":{"_type":"localeString","en":"Company","ru":"Компания"},"name":"title"},{"name":"description","translations":{"_type":"localeString","en":"Company description","ru":"Описание компании"}},{"translations":{"en":"Company keywords","ru":"Ключевые слова для компании","_type":"localeString"},"name":"keywords"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"mont":{"id":1750,"title":"MONT","logoURL":"https://old.roi4cio.com/uploads/roi/company/MONT.png","alias":"mont","address":"","roles":[{"id":2,"type":"supplier"}],"description":"MONT Group of Companies started its business in 1991 and is now one of the largest software distributors in the Caucasus, Central Asia and Mongolia.\r\nToday MONT - is:\r\nThe maximum geographical coverage: branches in all federal districts of Russia, as well as offices in Armenia, Azerbaijan, Georgia, Kazakhstan and Kyrgyzstan. And MONT is - not the limit!\r\nMore than 5,000 partners, among which are leading system integrators with a staff of several thousand employees, and small companies, in which one person often performs the functions and director and purchasing manager and retailer. We strive to provide the same high level of service in the work of all partners. MONT find the approach to everyone!\r\nA broad product portfolio, including both long and well-known software products and solutions from the very young and promising players. Integrated project of the customer? MONT have the right solution is always there!\r\nTechnical expertise and advice. MONT certified specialists provide professional support on a variety of issues ranging from the licensing of software to legal support. Difficult question? MONT help!\r\n<span style=\"font-weight: bold; \">Key business areas:</span>\r\n<ul><li>Classical Distribution: Supply of licenses for traditional scheme (order from a customer placing an order with a distributor, shipping warehouse vendor, partner delivery, installation at the customer)</li><li>Expert solutions: comprehensive delivery of software products and solutions, as well as pre-Salem, technical and service support projects</li><li>Cloud services: the provision of remote access to software solutions and applications to create a private cloud (IT infrastructure) companies of all sizes</li><li>Electronic distribution: software sales channel that allows to deliver electronic keys directly from the vendor online, through a technological platform MONT Webstore</li></ul>","companyTypes":["supplier"],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":242,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":23,"supplierPartnersCount":0,"b4r":0,"categories":{"1":{"id":1,"title":"Desktop virtualization","description":" Desktop virtualization is a virtualization technology that separates an individual's PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.\r\nDesktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.\r\nDesktop virtualization has many benefits, including a lower total cost of ownership (TCO), increased security, reduced energy costs, reduced downtime and centralized management.\r\nLimitations of desktop virtualization include difficulty in maintenance and set up of printer drivers; increased downtime in case of network failures; complexity and costs involved in VDI deployment and security risks in the event of improper network management.<br /><br />","materialsDescription":" <span style=\"font-weight: bold; \">What are types of desktop virtualization technologies?</span>\r\nHost-based forms of desktop virtualization require that users view and interact with their virtual desktops over a network by using a remote display protocol. Because processing takes place in a data center, client devices can be traditional PCs, but also thin clients, zero clients, smartphones and tablets. Examples of host-based desktop virtualization technology include:\r\n<span style=\"font-weight: bold; \">Host-based virtual machines:</span> Each user connects to an individual VM that is hosted in a data center. The user may connect to the same VM every time, allowing for personalization (known as a persistent desktop), or be given a fresh VM at each login (a nonpersistent desktop).\r\n<span style=\"font-weight: bold; \">Shared hosted:</span> Users connect to a shared desktop that runs on a server. Microsoft Remote Desktop Services, formerly Terminal Services, takes this client-server approach. Users may also connect to individual applications running on a server; this technology is an example of application virtualization.\r\n<span style=\"font-weight: bold; \">Host-based physical machines:</span> The operating system runs directly on another device's physical hardware.\r\nClient virtualization requires processing to occur on local hardware; the use of thin clients, zero clients and mobile devices is not possible. These types of desktop virtualization include:\r\n<span style=\"font-weight: bold; \">OS image streaming:</span> The operating system runs on local hardware, but it boots to a remote disk image across the network. This is useful for groups of desktops that use the same disk image. OS image streaming, also known as remote desktop virtualization, requires a constant network connection in order to function.\r\n<span style=\"font-weight: bold; \">Client-based virtual machines:</span> A VM runs on a fully functional PC, with a hypervisor in place. Client-based virtual machines can be managed by regularly syncing the disk image with a server, but a constant network connection is not necessary in order for them to function.\r\n<span style=\"font-weight: bold;\">Desktop virtualization vs. virtual desktop infrastructure</span>\r\nThe terms <span style=\"font-style: italic;\">desktop virtualization</span> and virtual desktop infrastructure (VDI) are often used interchangeably, but they are not the same. While VDI is a type of desktop virtualization, not all desktop virtualization uses VDI.\r\nVDI refers to the use of host-based VMs to deliver virtual desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology. Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- are not examples of VDI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_virtualization.png","alias":"desktop-virtualization"}},"branches":"Information Technology","companySizes":"501 to 1000 Employees","companyUrl":"https://www.mont.com/","countryCodes":["ARE","ARM","AZE","GEO","KGZ","KAZ","MNG","UZB"],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":false,"presenterCodeLng":"","seo":{"title":"MONT","keywords":"MONT, software, from, solutions, support, customer, well, which","description":"MONT Group of Companies started its business in 1991 and is now one of the largest software distributors in the Caucasus, Central Asia and Mongolia.\r\nToday MONT - is:\r\nThe maximum geographical coverage: branches in all federal districts of Russia, as well as o","og:title":"MONT","og:description":"MONT Group of Companies started its business in 1991 and is now one of the largest software distributors in the Caucasus, Central Asia and Mongolia.\r\nToday MONT - is:\r\nThe maximum geographical coverage: branches in all federal districts of Russia, as well as o","og:image":"https://old.roi4cio.com/uploads/roi/company/MONT.png"},"eventUrl":"","vendorPartners":[{"vendor":"Microsoft","partnershipLevel":"Distributor","countries":"Republic of Armenia, Republic of Azerbaijan, Georgia, Republic of Kazakhstan, Russian Federation","partnersType":""},{"vendor":"Oracle","partnershipLevel":"Distributor","countries":"","partnersType":""},{"vendor":"VMware","partnershipLevel":"Authorized Distributor","countries":"Republic of Azerbaijan, Russian Federation","partnersType":""},{"vendor":"Check Point","partnershipLevel":"Distributor","countries":"","partnersType":""},{"vendor":"Hewlett Packard Enterprise","partnershipLevel":"Distributor","countries":"Republic of Kazakhstan, Russian Federation","partnersType":""},{"vendor":"Symantec","partnershipLevel":"Distributor","countries":"Russian Federation","partnersType":""},{"vendor":"IBM","partnershipLevel":"Distributor","countries":"Georgia, Russian Federation","partnersType":""},{"vendor":"Autodesk","partnershipLevel":"Distributor","countries":"Republic of Kazakhstan, Russian Federation","partnersType":""},{"vendor":"Adobe","partnershipLevel":"Distributor","countries":"Russian Federation","partnersType":""},{"vendor":"McAfee","partnershipLevel":"Distributor","countries":"Russian Federation","partnersType":"Distributor and Reseller"},{"vendor":"ESET","partnershipLevel":"Distributor","countries":"","partnersType":""},{"vendor":"Corel","partnershipLevel":"Distributor","countries":"Russian Federation","partnersType":""},{"vendor":"Red Hat","partnershipLevel":"Distributor","countries":"Georgia, Russian Federation","partnersType":""},{"vendor":"Positive Technologies","partnershipLevel":"Distributor","countries":"Georgia, Russian Federation","partnersType":""},{"vendor":"Veeam","partnershipLevel":"Distributor","countries":"Georgia, Russian Federation","partnersType":""},{"vendor":"ABBYY","partnershipLevel":"Distributor","countries":"Russian Federation","partnersType":"Distributor and Reseller"},{"vendor":"PROMT","partnershipLevel":"Distributor","countries":"Georgia, Russian Federation","partnersType":""},{"vendor":"Bentley Systems","partnershipLevel":"Distributor","countries":"Russian Federation","partnersType":"Distributor and Reseller"},{"vendor":"Commvault","partnershipLevel":"Distributor","countries":"Russian Federation","partnersType":""},{"vendor":"Parallels","partnershipLevel":"Distributor","countries":"","partnersType":""},{"vendor":"Dr.Web","partnershipLevel":"Distributor","countries":"Georgia, Russian Federation","partnersType":""},{"vendor":"Embarcadero Technologies","partnershipLevel":"Distributor","countries":"","partnersType":"Distributor and Reseller"},{"vendor":"Nero","partnershipLevel":"","countries":"","partnersType":""}],"supplierPartners":[],"vendoredProducts":[],"suppliedProducts":[{"id":3336,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/large-logo-mcafee.png","logo":true,"scheme":false,"title":"McAfee MVISION Mobile","vendorVerified":1,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":110,"alias":"mcafee-mvision-mobile","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<h2>Always-on defense for on-the-go devices</h2>\r\nUnlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, McAfee MVISION Mobile sits directly on mobile devices to provide always-on protection no matter how a device is connected—via a corporate network, public access point, or cellular carrier—and even offline.\r\n<h2>Advanced analysis thwarts advanced attacks</h2>\r\nMachine learning algorithms analyze deviations to device behavior and make determinations about indicators of compromise to accurately identify advanced device, application, and network-based attacks.\r\n<h2>A single console for all devices—including mobile</h2>\r\nAs an integrated component of McAfee Device Security, McAfee MVISION Mobile extends visibility and control of your mobile assets from the same single console of all your McAfee-managed devices, including OS-based endpoints, servers, containers, and embedded IoT devices.","shortDescription":"McAfee MVISION Mobile defends your employees and their devices from the boardroom to the coffeehouse.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee MVISION Mobile","keywords":"","description":"<h2>Always-on defense for on-the-go devices</h2>\r\nUnlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, McAfee MVISION Mobile sits directly on mobile devices to provide always-on protection no matter how a device is con","og:title":"McAfee MVISION Mobile","og:description":"<h2>Always-on defense for on-the-go devices</h2>\r\nUnlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, McAfee MVISION Mobile sits directly on mobile devices to provide always-on protection no matter how a device is con","og:image":"https://old.roi4cio.com/fileadmin/user_upload/large-logo-mcafee.png"},"eventUrl":"","translationId":3341,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":3,"title":"MDM - Mobile Device Management","alias":"mdm-mobile-device-management","description":" <span style=\"font-weight: bold; \">Mobile device management (MDM)</span> is an industry term for the administration of mobile devices, such as smartphones, tablet computers and laptops. Device management system is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices.\r\nMDM is typically a deployment of a combination of on-device applications and configurations, corporate policies and certificates, and backend infrastructure, for the purpose of simplifying and enhancing the IT management of end user devices. In modern corporate IT environments, the sheer number and diversity of managed devices (and user behavior) has motivated device management tools that allow the management of devices and users in a consistent and scalable way. The overall role of MDM is to increase device supportability, security, and corporate functionality while maintaining some user flexibility.\r\nMany organizations administer devices and applications using MDM products/services. Mobile device management software primarily deals with corporate data segregation, securing emails, securing corporate documents on devices, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories. MDM implementations may be either on-premises or cloud-based.\r\nMDM functionality can include over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. Most recently laptops and desktops have been added to the list of systems supported as Mobile Device Management becomes more about basic device management and less about the mobile platform itself. \r\nSome of the <span style=\"font-weight: bold; \">core functions</span> of mobile management software include:\r\n<ul><li>Ensuring that diverse user equipment is configured to a consistent standard/supported set of applications, functions, or corporate policies</li><li>Updating equipment, applications, functions, or policies in a scalable manner</li><li>Ensuring that users use applications in a consistent and supportable manner</li><li>Ensuring that equipment performs consistently</li><li>Monitoring and tracking equipment (e.g. location, status, ownership, activity)</li><li>Being able to efficiently diagnose and troubleshoot equipment remotely</li></ul>\r\nDevice management solutions are leveraged for both company-owned and employee-owned (Bring Your Own Device) devices across the enterprise or mobile devices owned by consumers. Consumer demand for BYOD is now requiring a greater effort for MDM and increased security for both the devices and the enterprise they connect to, especially since employers and employees have different expectations concerning the types of restrictions that should be applied to mobile devices.\r\nBy controlling and protecting the data and configuration settings of all mobile devices in a network, enterprise device management software can reduce support costs and business risks. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime.\r\nWith mobile devices becoming ubiquitous and applications flooding the market, mobile monitoring is growing in importance. The use of mobile device management across continues to grow at a steady pace, and is likely to register a compound annual growth rate (CAGR) of nearly 23% through 2028. The US will continue to be the largest market for mobile device management globally. ","materialsDescription":"<h1 class=\"align-center\">How Mobile Device Management works?</h1>\r\nMobile device management relies on endpoint software called an MDM agent and an MDM server that lives in a data center. IT administrators configure policies through the MDM server's management console, and the server then pushes those policies over the air to the MDM agent on the device. The agent applies the policies to the device by communicating with application programming interfaces (APIs) built directly into the device operating system.\r\nSimilarly, IT administrators can deploy applications to managed devices through the MDM server. Mobile software management emerged in the early 2000s as a way to control and secure the personal digital assistants and smartphones that business workers began to use. The consumer smartphone boom that started with the launch of the Apple iPhone in 2007 led to the bring your own device trend, which fueled further interest in MDM.\r\nModern MDM management software supports not only smartphones but also tablets, Windows 10 and macOS computers and even some internet of things devices. The practice of using MDM to control PCs is known as unified endpoint management.\r\n<h1 class=\"align-center\">Key Benefits of Mobile Device Management Software</h1>\r\n<span style=\"font-weight: bold;\">Reduce IT Administration.</span> Instead of manually configuring and testing each new mobile device, mobile device software takes care of the repetitive tasks for you. That gives IT staff more time to work on challenging projects that improve productivity.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Improve End-user Productivity. </span>Mobile device management helps end users become more productive because the process of requesting new mobile devices can be cut down from days to hours. Once end users have the device in their hands, mobile device management program helps them get set up on their corporate network much faster. That means less time waiting to get access to email, internal websites, and calendars.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Reduce IT Risk.</span> Mobile devices, especially if your organization allows “Bring Your Own Device” (BYOD), create increased risk exposures. Typically, IT managers respond to these risks in one of two ways, neither of which help. First, you may say “no” to mobile device requests. That’s a fast way to become unpopular. Second, you may take a manual approach to review and oversee each device.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Enable Enterprise Growth. </span>If your enterprise added a thousand employees this quarter through hiring, acquisition, or other changes, could IT handle the challenge? If you’re honest, you can probably imagine going through plenty of struggles and missing SLAs. That kind of disappointment and missed service expectations make end users respect IT less. \r\nBy using enterprise device management thoroughly, you'll enable enterprise growth. You'll have the systems and processes to manage 100 users or 10,000 users. That means IT will be perceived as enabling growth not standing in the way.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MDM_Mobile_Device_Management.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"},{"id":41,"title":"Antispam","alias":"antispam","description":"In each system, which involves the communication of users, there is always the problem of spam, or the mass mailing of unsolicited emails, which is solved using the antispam system. An antispam system is installed to catch and filter spam at different levels. Spam monitoring and identification are relevant on corporate servers that support corporate email, here the antispam system filters spam on the server before it reaches the mailbox. There are many programs that help to cope with this task, but not all of them are equally useful. The main objective of such programs is to stop sending unsolicited letters, however, the methods of assessing and suppressing such actions can be not only beneficial but also detrimental to your organization. So, depending on the rules and policies of mail servers, your server, or even a domain, may be blacklisted and the transfer of letters will be limited through it, and you may not even be warned about it.\r\nThe main types of installation and use of anti-spam systems:\r\n<ul><li>installation of specialized equipment, a gateway that filters mail before it reaches the server;</li><li>use of external antispam systems for analyzing emails and content;</li><li>setting up an antispam system with the ability to learn on the mail server itself;</li><li>installation of spam filtering software on the client’s computer.</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">Anti-spam technologies:</span>\r\n<span style=\"font-weight: bold;\">Heuristic analysis</span>\r\nExtremely complex, highly intelligent technology for empirical analysis of all parts of a message: header fields, message bodies, etc. Not only the message itself is analyzed. The heuristic analyzer is constantly being improved, new rules are continuously added to it. It works “ahead of the curve” and makes it possible to recognize still unknown varieties of spam of a new generation before the release of available updates.\r\n<span style=\"font-weight: bold;\">Filtering counteraction</span>\r\nThis is one of the most advanced and effective anti-spam technologies. It is to recognize the tricks resorted to by spammers to bypass anti-spam filters.\r\n<span style=\"font-weight: bold;\">HTML based analysis</span>\r\nHTML code comparable to samples of HTML signatures in antispam. Such a comparison, using the available data on the size of typical spam images, protects users from spam messages using HTML-code, which are often included in the online image.\r\n<span style=\"font-weight: bold;\">Spam detection technology for message envelopes</span>\r\nDetection of fakes in the "stamps" of SMTP-servers and in other elements of the e-mail header is the newest direction in the development of anti-spam methods. Email addresses can not be trusted. Fake emails contain more than just spam. For example, anonymous and even threats. Technologies of various anti-spam systems allow you to send such messages. Thus, it provides not only the economic movement, but also the protection of employees.\r\n<span style=\"font-weight: bold;\">Semantic analysis</span>\r\nMeaning in words and phrases is compared with typical spam vocabulary. Comparison of provisions for a special dictionary, for expression and symbols.\r\n<span style=\"font-weight: bold;\">Anti-camming technology</span>\r\nScamming is probably the most dangerous type of spam. All of them have the so-called "Nigerian letters", reports of winnings in the lottery, casino, fake letters and credit services.\r\n<span style=\"font-weight: bold;\">Technical spam filtering</span>\r\nAutomatic notification of e-mail - bounce-messages - to inform users about the malfunction of the postal system (for example, non-delivery of address letters). Attackers can use similar messages. Under the guise of a technical notification, computer service or ordinary spam can penetrate the computer.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Antispam.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":" <span style=\"font-weight: bold; \">Web filtering</span> is a technology that stops users from viewing certain URLs or websites by preventing their browsers from loading pages from these sites. Web filters are made in different ways and deliver various solutions for individual, family, institutional or enterprise use.\r\nIn general, Web filters work in two distinct ways. They can <span style=\"font-weight: bold; \">block content</span> as determined by quality of the site, by consulting known lists which document and categorize popular pages across all genres of content. Or, they can <span style=\"font-weight: bold; \">evaluate the content</span> of the page live and block it accordingly. Many Web filter tools work off of a constantly updated URL database that shows which websites and domains are associated with hosting malware, phishing, viruses or other tools for harmful activities.\r\n<span style=\"font-weight: bold;\">Web Filtering Types.</span> <span style=\"font-style: italic;\">Blacklist & Whitelist Filters:</span>when using blacklists, an administrator (which might be a parent) manually enters all websites that are deemed inappropriate into the program, and those sites are subsequently blocked. Whitelists are used in exactly the same way, only in reverse – i.e. URLs are manually entered onto a whitelist, and all other websites are then off-limits.\r\n<span style=\"font-style: italic; \">Keyword And Content Filters: </span>this type of filtering is in many ways similar to black and whitelist filtering, though with a slightly broader scope. Keyword and content filters will filter out websites that contain specific keywords or predefined content (such as pornography, for example).\r\nSome website filtering software also provides reporting so that the installer can see what kind of traffic is being filtered and who has requested it. Some products provide soft blocking (in which a warning page is sent to the user instead of the requested page while still allowing access to the page) and an override capability that allows an administrator to unlock a page. \r\n<span style=\"font-weight: bold; \">Web Filtering Software for Business.</span> Most organizations have moved to cloud based-applications, making browsers a tool that employees use on a daily basis to access work. Browsers have become a conduit to not only the cloud, but also to immeasurable malware and distractions hosted on the web. In order to ensure that browsers do not bring in malicious traffic, web filtering software becomes necessary.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">What is Enterprise Web Filtering Software?</h1>\r\nAntivirus and antimalware software are required to detect malicious programs that has been downloaded, but it is now important for enterprise web filtering software to be installed. Content filtering software is an invaluable protection against a wide range of web-borne threats. Rather than allowing malware and ransomware to be downloaded, it prevents end users from visiting websites that contain these malicious threats.\r\nInternet filtering software is also one of the most effective ways to neutralize the threat from phishing. Phishing is a technique used by cybercriminals to gain access to sensitive user information. Phishers trick end users into revealing login credentials or downloading malicious software onto their computers.\r\nPhishing involves sophisticated social engineering techniques to fool end users into visiting malicious websites. If employees can be convinced to reveal sensitive information or download ransomware or malware, cybercriminals can easily bypass even the most sophisticated of cybersecurity defenses.\r\n<h1 class=\"align-center\">What is URL Filtering?</h1>\r\nURL filtering is a type of network filtering software that helps businesses control their users’ and guests’ ability to access certain content on the web. If you’ve ever gotten a “block” page while surfing the internet at the office, then your company is using web filtering.\r\nSome employers may only be concerned about blocking access to websites that are known to spread malware or steal information. Other businesses may block content they find inappropriate, such as adult websites or sites that promote violence, or content that violates compliance regulations. They may also choose to activate web protection software to block social media or video streaming sites to minimize drains on productivity and network bandwidth.\r\nTypically, URL filtering software is provided by a cybersecurity service, firewall, or router. Each of these may use a variety of threat intelligence sources to determine which websites fit into their chosen acceptable and unacceptable categories. That’s where highly reliable web reputation services are most valuable. Sources that have extensive web histories and real-time active crawling services will provide the most accurate content determinations.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_filtering.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3593,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png","logo":true,"scheme":false,"title":"Microsoft Defender Advanced Threat Protection (ATP)","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":272,"alias":"microsoft-defender-advanced-threat-protection-atp","companyTitle":"Microsoft","companyTypes":["vendor"],"companyId":163,"companyAlias":"microsoft","description":"<span style=\"font-weight: bold; \">Microsoft Defender Advanced Threat Protection (ATP)</span> is a complete security solution.\r\n<span style=\"font-weight: bold; \">Agentless, cloud-powered</span>\r\nNo additional deployment or infrastructure. No delays or update compatibility issues. Always up to date.\r\n<span style=\"font-weight: bold; \">Unparalleled optics</span>\r\nBuilt into Windows 10 for deeper insights. Exchanges signals with the Microsoft Intelligent Security Graph.\r\n<span style=\"font-weight: bold; \">Automated security</span>\r\nTake your security to a new level, by going from alert to remediation in minutes – at scale.\r\n<span style=\"font-weight: bold; \">Synchronized defense</span>\r\nMicrosoft 365 shares detection and exploration – across devices, identities and information – to speed up response and recovery.\r\n\r\n<span style=\"font-weight: bold; \">Announcing Threat & Vulnerability Management</span>\r\nThreat and Vulnerability Management is a new capability within Microsoft Defender ATP designed to empower security teams to discover, prioritize and remediate vulnerabilities, and misconfigurations.<br /><span style=\"font-weight: bold; \">Microsoft Threat Experts</span>\r\nMicrosoft Threat Experts further empowers your Security Operations Centers by providing them with deep knowledge, expert level threat monitoring, analysis, and support to identify critical threats in your unique environment.\r\n<span style=\"font-weight: bold; \">Automation: From alert to remediation in minutes - at scale</span>\r\nAutomatically investigate alerts and remediate complex threats in minutes. Applies industry best practices and intelligent decision-making algorithms to determine whether a threat - file or fileless - is active and what action to take.\r\n<span style=\"font-weight: bold; \">Protect your business from advanced threats</span>\r\nThrough the power of the cloud, machine learning and behavior analytics, Microsoft Defender ATP provides connected pre-breach protection.\r\n<span style=\"font-weight: bold;\">Innovative Endpoint Detection and Response (EDR)</span>\r\nCyber attacks remain a serious threat. Microsoft Defender ATP detects network attacks and data breaches, and gives you the insights and tools to close incidents quickly.","shortDescription":"Microsoft Defender Advanced Threat Protection (ATP) is a unified platform for preventative protection, post-breach detection, automated investigation, and response.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Defender Advanced Threat Protection (ATP)","keywords":"","description":"<span style=\"font-weight: bold; \">Microsoft Defender Advanced Threat Protection (ATP)</span> is a complete security solution.\r\n<span style=\"font-weight: bold; \">Agentless, cloud-powered</span>\r\nNo additional deployment or infrastructure. No delays or update co","og:title":"Microsoft Defender Advanced Threat Protection (ATP)","og:description":"<span style=\"font-weight: bold; \">Microsoft Defender Advanced Threat Protection (ATP)</span> is a complete security solution.\r\n<span style=\"font-weight: bold; \">Agentless, cloud-powered</span>\r\nNo additional deployment or infrastructure. No delays or update co","og:image":"https://old.roi4cio.com/fileadmin/user_upload/microsoft.png"},"eventUrl":"","translationId":3594,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":838,"title":"Endpoint Detection and Response","alias":"endpoint-detection-and-response","description":"Endpoint Detection and Response (EDR) is a cybersecurity technology that addresses the need for continuous monitoring and response to advanced threats. It is a subset of endpoint security technology and a critical piece of an optimal security posture. EDR differs from other endpoint protection platforms (EPP) such as antivirus (AV) and anti-malware in that its primary focus isn't to automatically stop threats in the pre-execution phase on an endpoint. Rather, EDR is focused on providing the right endpoint visibility with the right insights to help security analysts discover, investigate and respond to very advanced threats and broader attack campaigns stretching across multiple endpoints. Many EDR tools, however, combine EDR and EPP.\r\nWhile small and mid-market organizations are increasingly turning to EDR technology for more advanced endpoint protection, many lack the resources to maximize the benefits of the technology. Utilizing advanced EDR features such as forensic analysis, behavioral monitoring and artificial intelligence (AI) is labor and resource intensive, requiring the attention of dedicated security professionals.\r\nA managed endpoint security service combines the latest technology, an around-the-clock team of certified CSOC experts and up-to-the-minute industry intelligence for a cost-effective monthly subscription. Managed services can help reduce the day-to-day burden of monitoring and responding to alerts, enhance security orchestration and automation (SOAR) and improve threat hunting and incident response.","materialsDescription":"<span style=\"font-weight: bold; \">What is Endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response is an emerging technology that addresses the need for continuous monitoring and response to advanced threats. One could even make the argument that endpoint detection and response is a form of advanced threat protection.\r\n<span style=\"font-weight: bold;\">What are the Key Aspects of EDR Security?</span>\r\nAccording to Gartner, effective EDR must include the following capabilities:\r\n<ul><li>Incident data search and investigation</li><li>Alert triage or suspicious activity validation</li><li>Suspicious activity detection</li><li>Threat hunting or data exploration</li><li>Stopping malicious activity</li></ul>\r\n<span style=\"font-weight: bold;\">What to look for in an EDR Solution?</span>\r\nUnderstanding the key aspects of EDR and why they are important will help you better discern what to look for in a solution. It’s important to find EDR software that can provide the highest level of protection while requiring the least amount of effort and investment — adding value to your security team without draining resources. Here are the six key aspects of EDR you should look for:\r\n<span style=\"font-weight: bold;\">1. Visibility:</span> Real-time visibility across all your endpoints allows you to view adversary activities, even as they attempt to breach your environment and stop them immediately.\r\n<span style=\"font-weight: bold;\">2. Threat Database:</span> Effective EDR requires massive amounts of telemetry collected from endpoints and enriched with context so it can be mined for signs of attack with a variety of analytic techniques.\r\n<span style=\"font-weight: bold;\">3. Behavioral Protection:</span> Relying solely on signature-based methods or indicators of compromise (IOCs) lead to the “silent failure” that allows data breaches to occur. Effective endpoint detection and response requires behavioral approaches that search for indicators of attack (IOAs), so you are alerted of suspicious activities before a compromise can occur.\r\n<span style=\"font-weight: bold;\">4. Insight and Intelligence:</span> An endpoint detection and response solution that integrates threat intelligence can provide context, including details on the attributed adversary that is attacking you or other information about the attack.\r\n<span style=\"font-weight: bold;\">5. Fast Response:</span> EDR that enables a fast and accurate response to incidents can stop an attack before it becomes a breach and allow your organization to get back to business quickly.\r\n<span style=\"font-weight: bold;\">6. Cloud-based Solution:</span> Having a cloud-based endpoint detection and response solution is the only way to ensure zero impact on endpoints while making sure capabilities such as search, analysis and investigation can be done accurately and in real time.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/hgghghg.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5918,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/AssetWise_CONNECTEdition_Logo.jpg","logo":true,"scheme":false,"title":"AssetWise","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"assetwise","companyTitle":"Bentley Systems","companyTypes":["vendor"],"companyId":2776,"companyAlias":"bentley-systems","description":"Intelligently plan and implement asset performance and reliability strategies. AssetWise provides informed decision support from capital planning through proactive asset maintenance, enabling you to mitigate risk, increase operational efficiency, and ensure regulatory compliance. With improved information flow and interoperability you can collect, analyze, and control relevant asset information. AssetWise delivers actionable information that supports your business processes and drives the performance of your infrastructure assets.\r\nAligned with BIM, PAS, and ISO asset management standards, AssetWise leverages a connected data environment to facilitate the interoperation of multiple data sources, providing a common view of data that delivers accurate and reliable information when it is needed to operations, maintenance, and engineering. With AssetWise CONNECT Edition, your organization can maximize collaboration by communicating critical requirements more effectively across IT, OT, and ET disciplines, and across the entire lifecycle of your assets. Multi-phase deployment allows you to spread investment over time, minimizing operational disruptions.<br /><br />With AssetWise Asset Reliability you can:\r\n<ul><li>Identify assets posing the greatest risk to your business and rank assets by failure consequence and relative risk</li></ul>\r\n<ul><li>View asset condition data and trends in an asset health dashboard to analyze and strategically plan inspections and maintenance</li></ul>\r\n<ul><li>Perform asset condition analytics for linear assets to enhance predictive maintenance and planning</li></ul>\r\n<ul><li>Provide proof of regulatory compliance with historical and real-time condition reports</li></ul>\r\n<ul><li>Manage assets spread across a wide geographic area with a solution that supports your mobile workforce</li></ul>\r\n<ul><li>Optimize worker safety by minimizing unplanned outages, preventing catastrophic failure, and maximizing worker engagement in the field</li></ul>","shortDescription":"AssetWise: Ensuring safe, reliable, compliant, and cost-effective operations","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AssetWise","keywords":"","description":"Intelligently plan and implement asset performance and reliability strategies. AssetWise provides informed decision support from capital planning through proactive asset maintenance, enabling you to mitigate risk, increase operational efficiency, and ensure re","og:title":"AssetWise","og:description":"Intelligently plan and implement asset performance and reliability strategies. AssetWise provides informed decision support from capital planning through proactive asset maintenance, enabling you to mitigate risk, increase operational efficiency, and ensure re","og:image":"https://old.roi4cio.com/fileadmin/user_upload/AssetWise_CONNECTEdition_Logo.jpg"},"eventUrl":"","translationId":5918,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":417,"title":"Product Life-Cycle Management Applications","alias":"product-life-cycle-management-applications","description":"","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Product_Life_Cycle_Management_Applications.png"},{"id":64,"title":"PLM - Product Lifecycle Management","alias":"plm-product-lifecycle-management","description":"<span style=\"font-weight: bold; \">Product lifecycle management,</span> sometimes "product life cycle management", PLM, represents an all-encompassing vision for managing all data relating to the design, production, support and ultimate disposal of manufactured goods. Product life management concepts were first introduced where safety and control have been extremely important, notably the aerospace, medical device, military and nuclear industries. These industries originated the discipline of configuration management (CM), which evolved into electronic data management systems (EDMS), which then further evolved to product data management (PDM).\r\nOver the last ten years, manufacturers of instrumentation, industrial machinery, consumer electronics, packaged goods and other complex engineered products have discovered the benefits of PLM management and are adopting efficient PLM software in increasing numbers.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">The PLM Stages</span></p>\r\n<span style=\"font-weight: bold; \">Beginning of Life (BOL):</span> The beginning of life phase includes all of the design and manufacturing, which consists of the initial conceptualization and development, and any prototypes built. Initial development has multiple sub-actions that identify all the requirements, concepts, and necessary testing. \r\n<span style=\"font-weight: bold; \">Middle of Life (MOL):</span> The middle of life phase is post-manufacturing, when your product is distributed, used, and serviced. At this point, your product is in the hands of the end user. You can collect data on any failures, maintenance rates, and user experience to get information for immediate fixes and future development.\r\n<span style=\"font-weight: bold; \">End of Life (EOL):</span> The end of life phase is the retiring, recycling, or disposing of your product. At this point, the reverse logistics happen for the company. EOL starts when users no longer have a need for the product. At this stage, companies collect information about what parts and materials are still valuable.\r\n<span style=\"font-weight: bold;\">Product lifecycle management software</span> is used to deliver all kinds of products to market, which means there are a lot of different providers out there. Its purpose today is to help organizations: \r\n<ol><li>Develop new products using CAD software</li><li>Produce and manufacture new products</li><li>Bring those products to market</li></ol>\r\nAnd increasingly, product life management software has to process the feedback from the market back to the design and production processes. To achieve these goals, product lifecycle management solutions have to do four things:\r\n<ul><li>Link together CAD metadata with a bill of materials</li><li>Manage workflows for organizations needed to bring products to market</li><li>Manage product data as they move through the product development lifecycle stages</li><li> Hook in auxiliary suppliers and business stakeholders to a shared version of truth or single source of truth.</li></ul>\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Top PLM System Software Requirements</h1>\r\n<span style=\"font-weight: bold; \">Bill of Materials.</span> Having a common source of information across your company is incredibly important during product development. That’s why a bill of materials (BOM) is key to include in your list of product lifecycle management requirements. At the very least, your system should provide a single definition of a particular product and its components. More advanced options include features specifically designed for different team members such as designers, engineers and other professionals who frequently collaborate.\r\n<span style=\"font-weight: bold; \">Computer-Aided Design Management.</span> Managing your CAD activities and documents is more than useful when it comes to PLM. Your solution should be able to manage changes to product configurations while maintaining the functional and physical attributes of a product throughout its lifecycle. Production engineering changes should proliferate throughout your processes, with the changes evident in the subsequent BOMs and plans.\r\n<span style=\"font-weight: bold; \">Manufacturing Product Management.</span> During a product’s lifecycle, you want to keep an eye on your portfolio. With portfolio management, users can determine the proper investment balance to maximize their research and development investment returns. Some systems provide strategy tools to spotlight priorities and support planning. Top PLM software can even determine the best possible investment scenario. Users can also track project progress to completion, which is automatically documented in the product record. This allows greater insight into your processes, facilitating better resource management and allocation.\r\n<span style=\"font-weight: bold; \">Product Regulation and Governance.</span> Failing to follow regulation and compliance standards is one of the quickest ways to earn your business a bad reputation. But having the right tools built into your product life management system can make staying compliant much easier than it would be otherwise. Your solution should be able to centralize relevant information and documentation, making it easier for enterprise organizations to achieve and maintain compliance. You also may choose a system that can comply with medical, environmental, safety, FSA and ISO standards depending on your industry.\r\n<span style=\"font-weight: bold; \">Project and Component Maintenance.</span> Project management tools are vital for providing users visibility into daily processes and progress. These features include tracking and scheduling capabilities, which enable you to manage product development along with resource allocation in real time. Users can also see upcoming milestones and constraints for further planning.\r\n<span style=\"font-weight: bold; \">Quote Process Management.</span> Data from many different sources is often needed during the quote process. PLM’s inherent coordination capabilities gather and organize data pertaining to product design to support your engineering teams. This includes teams developing engineer-to-order and configure-to-order products. The system only shares the necessary data, meaning your team members can spend more time focusing on their work and less on hunting down information. \r\n<span style=\"font-weight: bold; \">Risk Management. </span>This feature brings risks to users’ attention, allowing them to manage, report and mitigate those instabilities. Reducing risks early on prevents issues from growing as they move through product development unseen, reducing the overall cost of development. Some systems do this by “detecting” or “highlighting” risks, whereas some systems simply offer full visibility through PM tools.\r\n<span style=\"font-weight: bold;\">Workflow and Change Management.</span> Plainly said, this suite of PLM software tools gives users insight into product activities. Users can determine phases for a project, as well as assign milestones to keep projects on track. Some systems allow users to see all pending and implemented changes, as well as all items that endure the subsequent effects. This visibility extends to portfolio and resource management, also.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/PLM_-_Product_Lifecycle_Management.png"},{"id":377,"title":"IT Asset Management","alias":"it-asset-management","description":" IT asset management is the set of business practices that join financial, contractual and inventory functions to support life cycle management and strategic decision making for the IT environment. Assets include all elements of software and hardware that are found in the business environment.\r\nIT asset management generally uses automation to manage the discovery of assets so inventory can be compared to license entitlements. Full business management of IT assets requires a repository of multiple types of information about the asset, as well as integration with other systems such as supply chain, help desk, procurement and HR systems and ITSM.\r\nHardware asset management entails the management of the physical components of computers and computer networks, from acquisition through disposal. Common business practices include request and approval process, procurement management, life cycle management, redeployment and disposal management. A key component is capturing the financial information about the hardware life cycle which aids the organization in making business decisions based on meaningful and measurable financial objectives.\r\nSoftware Asset Management is a similar process, focusing on software assets, including licenses. Standards for this aspect of data center management are part of ISO/IEC 19770.","materialsDescription":" <span style=\"font-weight: bold;\">What is Information Technology Asset Management?</span>\r\nIT asset management (information technology asset management, or ITAM) is a set of business practices that combines financial, inventory and contractual functions to optimize spending and support lifecycle management and strategic decision-making within the IT environment.\r\n<span style=\"font-weight: bold;\">What is the purpose of IT asset management?</span>\r\nAsset management allows the organization to keep track of all their assets. It can tell where the assets are located, how they are used, and when changes were made to them. The data from the asset management solution can ensure that asset recovery will lead to better returns.\r\n<span style=\"font-weight: bold;\">What are the benefits of asset management?</span>\r\nWith a structure asset management framework in place, organizations will realize these and other benefits:\r\nGood Business Practice. Asset management results in better decisions;\r\n<ul><li>Improved Regulatory Compliance;</li><li>Improved Reliability;</li><li>Long Term System Integrity;</li><li>Cost Savings;</li><li>Eligibility for Federal Funding.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the types of asset management?</span>\r\nThere are 7 types of asset management:\r\n<ul><li>Financial Asset Management.</li><li>Enterprise Asset Management.</li><li>Infrastructure Asset Management.</li><li>Public Asset Management.</li><li>IT Asset Management.</li><li>Fixed Assets Management.</li><li>Digital Asset Management.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IT_Asset_Management.png"},{"id":285,"title":"Operations and Manufacturing Applications","alias":"operations-and-manufacturing-applications","description":" Manufacturing operations management (MOM) is a collection of systems for managing end-to-end manufacturing processes with a view to optimizing efficiency.\r\nThere are many types of MOM software, including production management, performance analysis, quality and compliance, and human-machine interface (HMI). Production management software provides real-time information about jobs and orders, labor and materials, machine status, and product shipments. Performance analysis software displays metrics at the machine, line, plant, and enterprise-level for situational or historical analysis. Quality and compliance software are used to promote compliance with standards and specifications for operational processes and procedures. HMI software is a form of manufacturing operations management (MOM) software that enables operators to manage industrial and process control machinery using a computer-based interface.\r\nAdvancements in technology and market demands are enabling new capabilities in MOM software platforms, gradually closing gaps in end-user needs.\r\n<ul><li>Collaboration Capabilities: Collaboration and workflow services support people-to-people, people-to-systems, and systems-to-systems interactions, enforcing procedures and rules while flexibly adapting to real-time situations with alternate workflows and processes.</li><li>Security Services: Future manufacturing platforms will leverage common security services that determine roles, responsibilities, authorities, and access across all systems and application functions while fitting into corporate IT security schemes.</li><li>Asset & Production Model: Future manufacturing platforms will have a unified asset and production model that supports all of the interrelationships between physical production equipment, facilities, inventory/materials, and people, as well as production definitions such as the manufacturing bill of materials, productions orders, etc. This contrasts with older systems that either had subsets of these interrelationships across multiple databases or could not effectively deal with federating across multiple systems of record.</li><li>Operations Database & Historians: Evolving from older systems that had separate historians and production databases that were difficult to correlate across, service-based platforms will have a unified operations database and historian. This will capture and aggregate all time-series and production event information surrounding everything involved in each product and production run with a full genealogy of components and materials, related performance information, and federation across other systems and devices of record.</li><li>Visualization and Mobility: Today, different MOM applications support different graphical user interfaces, Web interfaces, specific mobile applications, etc. The future manufacturing platform will provide common visualization and mobility for a consistent user interface experience across different form factors, supporting dedicated and mobile workers that are orchestrated by consistent workflows and procedures.</li><li>Smaller and Focused 'Apps': Today’s monolithic systems and applications have too many interdependencies of databases, operate inconsistently, and are not inherently integrated. Being able to take advantage of many of the common software platform services described above, modular apps will be significantly smaller, simpler, and focused. These apps will be much lighter weight in functionality, and, as a result, significantly easier and faster to develop.</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">What is a manufacturing operating system?</span>\r\nA Manufacturing Execution System manages manufacturing operations such as product production rules, bill of materials, recipe data (product definition), resource management, scheduling, work batching (JiT Just in Time manufacturing), production data/logs, production performance, and some analysis.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Operations_and_Manufacturing_Applications_1_.png"},{"id":166,"title":"MES - Manufacturing Execution System","alias":"mes-manufacturing-execution-system","description":"<span style=\"font-weight: bold; \">Manufacturing execution systems (MES) </span> are computerized systems used in manufacturing, to track and document the transformation of raw materials to finished goods. MES software provides information that helps manufacturing decision makers understand how current conditions on the plant floor can be optimized to improve production output. Manufacturing execution solutions work in real time to enable the control of multiple elements of the production process (e.g. inputs, personnel, machines and support services).\r\nThe idea of Execution System might be seen as an intermediate step between, on the one hand, an enterprise resource planning (ERP) system, and a supervisory control and data acquisition (SCADA) or process control system on the other; although historically, exact boundaries have fluctuated. Industry groups such as MESA International— Manufacturing Enterprise Solutions Association were created in the early 1990s in order to address the complexity, and advise on execution, of MES Systems.\r\n<span style=\"color: rgb(97, 97, 97); \">Manufacturing execution software comes with a whole bunch of concepts and terms that help provide a better understanding of what they actually are. Here are some of the more common terms and concepts associated with MES:</span>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Enterprise resource planning (ERP) system</span>— strategic business process management tools that integrate all facets of an enterprise into one comprehensive information system that can be accessed by individuals across an entire organization.</span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">MESA-11</span>— published in 1997, this model — created by the Manufacturing Enterprise Solutions Association (MESA)— indicated the 11 core functions of a standard MES.</span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">ANSI/ISA-95 standard </span>— created for global manufacturers by the International Society of Automation, this is a standard set of guidelines for developers to follow when creating software that automatically links enterprise systems—like ERP—and control systems.</span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Overall equipment effectiveness (OEE)</span> — a general unit of measure that evaluates how well a machine works compared to its full potential.</span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Supervisory Control and Data Acquisition (SCADA) </span>— a system of software and hardware elements that allows manufacturers to maintain efficiency, process data for smarter decisions, and communicate system issues to help reduce downtime.</span></li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \"><span style=\"color: rgb(97, 97, 97); \">Core MES Functionality</span></span></p>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Operations management.</span> Offer employees a global view of planned production orders and their production routing. <br /></span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Dispatching production units.</span> Manage the bidirectional flow of production data in real time between the ERP and the workshop. This ensures production data is always accurate, consistent, and up to date.</span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Product tracking and genealogy.</span> Group final parts or batches with all their corresponding manufacturing data—from the raw material to the component assembly. This data is especially useful for manufa</span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Labor management.</span> Manages people, products, and/or operations and track any skills or authorizations they require.<br /></span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Quality management.</span> Manages the quality of manufacturing process and units. This function can be integrated directly into the Manufacturing execution system software or can use external software.</span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Maintenance management.</span> More easily and accurately plans preventative machine maintenance to reduce downtime and production interruptions.</span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Data collection and acquisition.</span> Tracks and gathers essential data and easily recall that data when needed.</span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Process management.</span> Provides process routing and operational sequencing—including full production traceability.</span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Performance analysis.</span> Consolidates data to calculate key performance indicators (KPIs) like rework, scrap, process capability, OEE, and more. <br /></span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Document control.</span> Provides a simple way for operators to access important documents—including instructions, drawings, notes, and more—when they need them. <br /></span></li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Resource allocation and status.</span> Defines and tracks the status of resources and how they are used in the production process.</span></li></ul>\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Is an MES right for my business?</h1>\r\n<p class=\"align-left\">There are plenty of benefits—including increased productivity, improved data capture, real-time visibility into your operations, an optimized workforce, and more. MES manufacturing software provides materials traceability, which is invaluable for manufacturers that must adhere to strict regulations. Manufacturers in the food and beverage, medical device, aeronautics and aerospace, and defense industries require this traceability to ensure they are compliant with regulations.</p>\r\n<p class=\"align-left\">However, manufacturing enterprise system isn’t for everyone. Smaller manufacturers may find that their production operations aren’t large enough to justify an additional software system like an MES. Additionally, they may feel that their profit margins don’t allow for this type of investment. Like any piece of technology, you have to weigh your options and decide if an MES is worth it for your manufacturing enterprise.</p>\r\n<h1 class=\"align-center\">How do MES and ERP systems work together?</h1>\r\n ERP and MES systems play separate but complementary roles in manufacturing operations. ERP systems integrate all facets of an enterprise into one comprehensive information system. For example, employees in planning and scheduling have access to the same data as the staff in financial management. All the data is also available in real time, which enables production managers to make faster, more informed business decisions.Meanwhile, MES is the layer between your manufacturing shop floor systems—like machines and supervisory systems—and your business, planning, and logistics systems—basically, your ERP solution. \r\nMES and ERP integrate with each other to provide a single source of truth throughout your organization. ERP systems can show you that you might need to improve your production output—MES management shows you how.\r\n<h1 class=\"align-center\">What should I be careful about as I pursue my MES strategy? </h1>\r\nKnow what you need. Know your own best-practices requirements. Know your production hardware and equipment inside out so you can be sure that it can be monitored and controlled by a prospective MES vendor's products. Don't believe every claim you hear from an MES software vendor. Ask them to prove their claims by checking with clients who've installed their applications and are seeing them work every day.\r\nKnow the vendor's responsibilities to uptime, production needs, tech support, training, and every other conceivable detail before you sign a contract. Know the answer to your question before you even ask the vendor, because you already did the research and know it from every angle. Be sure your prospective vendors value your critical business processes as much as their own before you put your factories and production into their hands.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/MES_-_Manufacturing_Execution_System1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4925,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/HP_Integrity_Superdome.png","logo":true,"scheme":false,"title":"HP Integrity Superdome","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":452,"alias":"hp-integrity-superdome","companyTitle":"Hewlett Packard Enterprise","companyTypes":["supplier","vendor"],"companyId":172,"companyAlias":"hewlett-packard-enterprise","description":"HP Superdome is the family of enterprise-class high-performance servers manufactured with both the PA-8900 processors (HP 9000 family) and Intel Itanium 2 processors (HP Integrity family). Superdome is represented by three models with 16, 32 and 64 processor sockets. Within the family, there is the possibility of moving from younger models to older ones, which ensures a reduction in initial costs, investment protection and the possibility of a phased increase in system performance. Superdome is a universal hierarchical crossbar architecture specifically designed to work with various types of processors. The main components of the architecture are Cells, Crossbar Backplane, and I / O subsystems.<br />\r\nThe cell board is the main unit of the Superdome system. It is a symmetrical multiprocessor (SMP) containing 4 processor sockets and up to 64 GB of main memory. It is possible (but not necessary) to connect to the cell its own I / O subsystem, which is an I / O basket with 12 PCI-X slots. Each cell can work in different configurations, i.e., be connected to other cells or form an independent independent server. In one system, cell boards can be combined with both PA-RISC processors and Itanium processors.<br />\r\nBackplane patch panels provide a non-blocking connection between cells, their associated memory, and I / O modules. The main principle underlying Superdome is the balanced performance of the system at all levels of the hierarchy in order to exclude the appearance of additional delays when the processors of one cell access the RAM located on other cells. The developed architecture allows the system to demonstrate record performance indicators for various types of tasks, such as operational transaction processing, technical calculations, processing of Internet transactions, analysis of large volumes of data, etc.<br />\r\nA single Superdome system can be logically divided into many hardware independent, software independent partitions, virtual machines, or resource partitions within a single server. Each hardware / software partition or virtual machine is running its own independent operating system. For cells with PA-RISC processors, the operating system is HP-UX 11i, and for cells with Itanium processors, HP-UX, Linux, Microsoft Windows 2003, and OpenVMS.\r\nTo implement effective system management and technical support, the Superdome server family includes:\r\n<ul><li>Event Monitoring System (EMS), an alert service that monitors the status of server hardware, including processors, memory, FC components, system buses, cache, system temperature, battery status, fans, power supplies.</li></ul>\r\n<ul><li>A hardware inventory service in Support Tools Manager (STM) that provides system inventory information, including serial numbers, part numbers, version levels, and so on.</li></ul>\r\n<ul><li>Support Management Station (SMS), which is used to start the process of scanning, diagnostics and testing the platform throughout the life cycle, including upgrades.</li></ul>\r\nThe Superdome family provides customers with investment protection and uptime thanks to a system infrastructure designed to upgrade to next-generation processors.","shortDescription":"HP Superdome is a premium server designed and manufactured by Hewlett Packard Enterprise.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"HP Integrity Superdome","keywords":"","description":"HP Superdome is the family of enterprise-class high-performance servers manufactured with both the PA-8900 processors (HP 9000 family) and Intel Itanium 2 processors (HP Integrity family). Superdome is represented by three models with 16, 32 and 64 processor s","og:title":"HP Integrity Superdome","og:description":"HP Superdome is the family of enterprise-class high-performance servers manufactured with both the PA-8900 processors (HP 9000 family) and Intel Itanium 2 processors (HP Integrity family). Superdome is represented by three models with 16, 32 and 64 processor s","og:image":"https://old.roi4cio.com/fileadmin/user_upload/HP_Integrity_Superdome.png"},"eventUrl":"","translationId":4926,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3392,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/vmware_evorail.png","logo":true,"scheme":false,"title":"VMware EVO:RAIL","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":97,"alias":"vmware-evorail","companyTitle":"VMware","companyTypes":["vendor"],"companyId":168,"companyAlias":"vmware","description":"EVO:RAIL enables power-on to Virtual Machine creation in minutes, radically easy VM deployment, easy non-disruptive patch and upgrades and simplified management.\r\nEVO:RAIL is a scalable Software-Defined Data Center (SDDC) building block that delivers compute, networking, storage, and management to empower private and hybrid cloud, end-user computing, test/dev, and branch office environments.\r\nBuilding on the proven technology of VMware vSphere, vCenter Server, and VMware Virtual SAN, EVO:RAIL delivers the first hyper-converged infrastructure appliance 100 percent powered by VMware software.\r\n<span style=\"font-weight: bold;\">EVO:RAIL Software Bundle:</span>\r\n<ul><li>EVO:RAIL rapid deployment, configuration and management engine;</li><li>Compute, network and storage virtualization enabled with vSphere and Virtual SAN.</li></ul>\r\n<span style=\"font-weight: bold;\">2U 4-node hardware platform optimized for EVO:RAIL:</span>\r\n<ul><li>Four independent nodes for compute, network and storage;</li><li>Each node has dual processors and 192GB memory;</li><li>Total of 16TB of SSD and HDD storage via Virtual SAN;</li><li>Phone and in-field hardware and software Support & Services (SnS).</li></ul>\r\nEVO:RAIL is delivered as a complete appliance solution with hardware, software, and support through Qualified EVO:RAIL Partners; customers choose their preferred brand.","shortDescription":"VMware EVO:RAIL combines compute, networking, and storage resources into a hyper-converged infrastructure appliance to create a simple, easy to deploy.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"VMware EVO:RAIL","keywords":"","description":"EVO:RAIL enables power-on to Virtual Machine creation in minutes, radically easy VM deployment, easy non-disruptive patch and upgrades and simplified management.\r\nEVO:RAIL is a scalable Software-Defined Data Center (SDDC) building block that delivers compute, ","og:title":"VMware EVO:RAIL","og:description":"EVO:RAIL enables power-on to Virtual Machine creation in minutes, radically easy VM deployment, easy non-disruptive patch and upgrades and simplified management.\r\nEVO:RAIL is a scalable Software-Defined Data Center (SDDC) building block that delivers compute, ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/vmware_evorail.png"},"eventUrl":"","translationId":3393,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":509,"title":"Converged and Hyper Converged System","alias":"converged-and-hyper-converged-system","description":" Converged and hyper convergent infrastructures simplify support for virtual desktop infrastructure and desktop virtualization, as they are designed to be easy to install and perform complex tasks.\r\nConvergent infrastructure combines the four main components of a data center in one package: computing devices, storage devices, network devices, and server virtualization tools. Hyper-converged infrastructure allows for tighter integration of a larger number of components using software tools.\r\nIn both convergent and hyper-convergent infrastructure, all elements are compatible with each other. Thanks to this, you will be able to purchase the necessary storage devices and network devices for your company at a time, and they, as you know, are of great importance in the virtual desktops infrastructure. This allows you to simplify the process of deploying such an infrastructure - something that has been waiting for and what will be rejoiced by many companies that need to virtualize their desktop systems.\r\nDespite its value and innovation, there are several questions to these technologies regarding their intended use and differences. Let's try to figure out what functionality offers converged and hyper-convergent infrastructures and how they differ.","materialsDescription":" <span style=\"font-weight: bold;\">What is converged infrastructure?</span>\r\nConvergent infrastructure combines computing devices, storage, network devices and server virtualization tools in one chassis so that they can be managed from one place. Management capabilities may include the management of virtual desktop infrastructure, depending on the selected configuration and manufacturer.\r\nThe hardware included in the bundled converged infrastructure is pre-configured to support any targets: virtual desktop infrastructures, databases, special applications, and so on. But in fact, you do not have enough freedom to change the selected configuration.\r\nRegardless of the method chosen for extending the virtual desktop infrastructure environment, you should understand that subsequent vertical scaling will be costly and time-consuming. Adding individual components is becoming complex and depriving you of the many benefits of a converged infrastructure. Adding workstations and expanding storage capacity in a corporate infrastructure can be just as expensive, which suggests the need for proper planning for any virtual desktop infrastructure deployment.\r\nOn the other hand, all components of a converged infrastructure can work for a long time. For example, a complete server of such infrastructure works well even without the rest of the infrastructure components.\r\n<span style=\"font-weight: bold;\">What is a hyper-convergent infrastructure?</span>\r\nThe hyper-converged infrastructure was built on the basis of converged infrastructure and the concept of a software-defined data center. It combines all the components of the usual data center in one system. All four key components of the converged infrastructure are in place, but sometimes it also includes additional components, such as backup software, snapshot capabilities, data deduplication functionality, intermediate compression, global network optimization (WAN), and much more. Convergent infrastructure relies primarily on hardware, and software-defined data center often adapts to any hardware. In the hyper-convergent infrastructure, these two possibilities are combined.\r\nHyper-converged infrastructure is supported by one supplier. It can be managed as a single system with a single set of tools. To expand the infrastructure, you just need to install blocks of necessary devices and resources (for example, storage) into the main system block. And this is done literally on the fly.\r\nSince the hyper-convergent infrastructure is software-defined (that is, the operation of the infrastructure is logically separated from the physical equipment), the mutual integration of components is denser than in a conventional converged infrastructure, and the components themselves must be nearby to work correctly. This makes it possible to use a hyper-convergent infrastructure to support even more workloads than in the case of conventional converged infrastructure. This is explained by the fact that it has the possibility of changing the principle of definition and adjustment at the program level. In addition, you can make it work with specialized applications and workloads, which pre-configured converged infrastructures do not allow.\r\nHyper-converged infrastructure is especially valuable for working with a virtual desktop infrastructure because it allows you to scale up quickly without additional costs. Often, in the case of the classic virtual desktops infrastructure, things are completely different - companies need to buy more resources before scaling or wait for virtual desktops to use the allocated space and network resources, and then, in fact, add new infrastructure.\r\nBoth scenarios require significant time and money. But, in the case of hyperconvergent infrastructure, if you need to expand the storage, you can simply install the required devices in the existing stack. Scaling can be done quickly — for the time required to deliver the equipment. In this case, you do not have to go through the full procedure of re-evaluation and reconfiguration of the corporate infrastructure.\r\nIn addition, when moving from physical PCs to virtual workstations, you will need devices to perform all the computational tasks that laptops and PCs typically perform. Hyper-converged infrastructure will greatly help with this, as it often comes bundled with a large amount of flash memory, which has a positive effect on the performance of virtual desktops. This increases the speed of I / O operations, smoothes work under high loads, and allows you to perform scanning for viruses and other types of monitoring in the background (without distracting users).\r\nThe flexibility of the hyper-converged infrastructure makes it more scalable and cost-effective compared to the convergent infrastructure since it has the ability to add computing and storage devices as needed. The cost of the initial investment for both infrastructures is high, but in the long term, the value of the investment should pay off.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Converged_and_Hyper_Converged_System.png"},{"id":532,"title":"Software","alias":"software","description":" Computer software, or simply software, is a collection of data or computer instructions that tell the computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. In computer science and software engineering, computer software is all information processed by computer systems, programs, and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be realistically used on its own.\r\nAt the lowest programming level, executable code consists of machine language instructions supported by an individual processor — typically a central processing unit (CPU) or a graphics processing unit (GPU). A machine language consists of groups of binary values signifying processor instructions that change the state of the computer from its preceding state. For example, an instruction may change the value stored in a particular storage location in the computer—an effect that is not directly observable to the user. An instruction may also invoke one of many input or output operations, for example displaying some text on a computer screen; causing state changes that should be visible to the user. The processor executes the instructions in the order they are provided, unless it is instructed to "jump" to a different instruction, or is interrupted by the operating system. As of 2015, most personal computers, smartphone devices, and servers have processors with multiple execution units or multiple processors performing computation together, and computing has become a much more concurrent activity than in the past.\r\nThe majority of software is written in high-level programming languages. They are easier and more efficient for programmers because they are closer to natural languages than machine languages. High-level languages are translated into machine language using a compiler or an interpreter or a combination of the two. Software may also be written in a low-level assembly language, which has strong correspondence to the computer's machine language instructions and is translated into machine language using an assembler.","materialsDescription":" <span style=\"font-weight: bold; \">What is software?</span>\r\nSometimes abbreviated as SW and S/W, software is a collection of instructions that enable the user to interact with a computer, its hardware, or perform tasks. Without software, most computers would be useless. For example, without your Internet browser software, you could not surf the Internet or read this page. Without an operating system, the browser could not run on your computer. The picture shows a Microsoft Excel box, an example of a spreadsheet software program.\r\n<span style=\"font-weight: bold; \">How do you get software?</span>\r\nSoftware can be purchased at a retail computer store or online and come in a box containing all the disks (floppy diskette, CD, DVD, or Blu-ray), manuals, warranty, and other documentation.\r\nSoftware can also be downloaded to a computer over the Internet. Once downloaded, setup files are run to start the installation process on your computer.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Free software</span></span>\r\nThere are also a lot of free software programs available that are separated into different categories.\r\n<ul><li>Shareware or trial software is software that gives you a few days to try the software before you have to buy the program. After the trial time expires, you'll be asked to enter a code or register the product before you can continue to use it.</li><li>Freeware is completely free software that never requires payment, as long as it is not modified.</li><li>Open-source software is similar to freeware. Not only is the program given away free, but the source code used to make the program is also, allowing anyone to modify the program or view how it was created.</li></ul>\r\n<span style=\"font-weight: bold; \">How do you use computer software?</span>\r\nOnce the software is installed on the computer hard drive, the program can be used anytime by finding the program on the computer. On a Windows computer, a program icon is added to the Start menu or Start screen, depending on your version of Windows.\r\n<span style=\"font-weight: bold;\">How to maintain software?</span>\r\nAfter the software is installed on your computer, it may need to be updated to fix any found errors. Updating a program can be done using software patches. Once updates are installed, any problems that may have been experienced in the program will no longer occur.\r\n<span style=\"font-weight: bold;\">How is software created and how does it work?</span>\r\nA computer programmer (or several computer programmers) writes the instructions using a programming language, defining how the software should operate on structured data. The program may then be interpreted or compiled into machine code.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4934,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IBM_LOGO.png","logo":true,"scheme":false,"title":"IBM WebSphere Enterprise Service Bus (ESB)","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":100,"alias":"ibm-websphere-enterprise-service-bus-esb","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"<span style=\"font-weight: bold; \">Features IBM WebSphere Enterprise Service Bus (ESB):</span><br />\r\n<ul><li>Brings consistency to point-to-point connectivity</li></ul>\r\n<ul><li>Provides smart connectivity on internet-standard application infrastructure, to connect any application or data</li></ul>\r\n<ul><li>Supports a broad range of native bindings and adapters for service-oriented integration, incl. web services, MQ and JMS messaging, HTTP, EJB, databases, files. file transfer, email, Lotus Domino, System i (RPG programs), CICS, IMS, SAP, Oracle, Siebel, PeopleSoft, JDEdwards.</li></ul>\r\n<ul><li>Integrates seamlessly with the industry-leading WebSphere software platform for streamlined IT operations</li></ul>\r\n<ul><li>Extends easily to IBM Business Process Manager Advanced for service orchestration and BPM</li></ul>\r\n<ul><li>Tightly integrates with WebSphere Service Registry and Repository for SOA solutions</li></ul>\r\n<ul><li>Leverages declarative IBM Integration Designer for visual programming and testing</li></ul>\r\n<ul><li>Provides an integrated solution for both service mediation and service hosting</li></ul>\r\n<ul><li>WebSphere ESB is easy to use from both a tools and a run-time perspective. IBM Integration Designer, the development tool of choice for WebSphere ESB, delivers an integrated, interactive, and visual development experience that requires minimal programming skills. You can get up and running quickly with a compelling out-of-the-box experience that is supported by easy-to-understand samples and comprehensive documentation.</li></ul>","shortDescription":"IBM WebSphere Enterprise Service Bus (ESB) provides fast and flexible application integration with smaller costs and opens an opportunity for use of methods of interaction of the next generation.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM WebSphere Enterprise Service Bus (ESB)","keywords":"","description":"<span style=\"font-weight: bold; \">Features IBM WebSphere Enterprise Service Bus (ESB):</span><br />\r\n<ul><li>Brings consistency to point-to-point connectivity</li></ul>\r\n<ul><li>Provides smart connectivity on internet-standard application infrastructure, to co","og:title":"IBM WebSphere Enterprise Service Bus (ESB)","og:description":"<span style=\"font-weight: bold; \">Features IBM WebSphere Enterprise Service Bus (ESB):</span><br />\r\n<ul><li>Brings consistency to point-to-point connectivity</li></ul>\r\n<ul><li>Provides smart connectivity on internet-standard application infrastructure, to co","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IBM_LOGO.png"},"eventUrl":"","translationId":4935,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":401,"title":"Service-Oriented Architecture and Web Services","alias":"service-oriented-architecture-and-web-services","description":" Service-oriented architecture (SOA) is a style of software design where services are provided to the other components by application components, through a communication protocol over a network. An SOA service is a discrete unit of functionality that can be accessed remotely and acted upon and updated independently, such as retrieving a credit card statement online. SOA is also intended to be independent of vendors, products and technologies.\r\nA service has four properties according to one of many definitions of SOA:\r\n<ul><li>It logically represents a business activity with a specified outcome.</li><li>It is self-contained.</li><li>It is a black box for its consumers, meaning the consumer does not have to be aware of the service's inner workings.</li><li>It may consist of other underlying services.</li></ul>\r\nDifferent services can be used in conjunction to provide the functionality of a large software application,[4] a principle SOA shares with modular programming. Service-oriented architecture integrates distributed, separately maintained and deployed software components. It is enabled by technologies and standards that facilitate components' communication and cooperation over a network, especially over an IP network.\r\nSOA is related to the idea of an application programming interface (API), an interface or communication protocol between different parts of a computer program intended to simplify the implementation and maintenance of software. An API can be thought of as the service, and the SOA the architecture that allows the service to operate.","materialsDescription":" <span style=\"font-weight: bold;\">What is Service-Oriented Architecture?</span>\r\nService-oriented architecture (SOA) is a software architecture style that supports and distributes application components that incorporates discovery, data mapping, security and more. Service-oriented architecture has two main functions:\r\n<ol><li>Create an architectural model that defines goals of applications and methods that will help achieve those goals.</li><li>Define implementations specifications linked through WSDL (Web Services Description Language) and SOAP (Simple Object Access Protocol) specifications.</li></ol>\r\nService-oriented architecture principles are made up of nine main elements:\r\n<ol><li>Standardized Service Contract where services are defined making it easier for client applications to understand the purpose of the service.</li><li>Loose Coupling is a way to interconnecting components within the system or network so that the components can depend on one another to the least extent acceptable. When a service functionality or setting changes there is no downtime or breakage of the application running.</li><li>Service Abstraction hides the logic behind what the application is doing. It only relays to the client application what it is doing, not how it executes the action.</li><li>Service Reusability divides the services with the intent of reusing as much as possible to avoid spending resources on building the same code and configurations.</li><li>Service Autonomy ensures the logic of a task or a request is completed within the code.</li><li>Service Statelessness whereby services do not withhold information from one state to another in the client application.</li><li>Service Discoverability allows services to be discovered via a service registry.</li><li>Service Composability breaks down larger problems into smaller elements, segmenting the service into modules, making it more manageable.</li><li>Service Interoperability governs the use of standards (e.g. XML) to ensure larger usability and compatibility.</li></ol>\r\n<span style=\"font-weight: bold;\">How Does Service-Oriented Architecture Work?</span>\r\nA service-oriented architecture (SOA) works as a components provider of application services to other components over a network. Service-oriented architecture makes it easier for software components to work with each other over multiple networks.\r\nA service-oriented architecture is implemented with web services (based on WSDL and SOAP), to be more accessible over standard internet protocols that are on independent platforms and programming languages.\r\nService-oriented architecture has 3 major objectives all of which focus on parts of the application cycle:\r\n<ol><li>Structure process and software components as services – making it easier for software developers to create applications in a consistent way.</li><li>Provide a way to publish available services (functionality and input/output requirements) – allowing developers to easily incorporate them into applications.</li><li>Control the usage of these services for security purposes – mainly around the components within the architecture, and securing the connections between those components.</li></ol>\r\nMicroservices architecture software is largely an updated implementation of service-oriented architecture (SOA). The software components are created as services to be used via APIs ensuring security and best practices, just as in traditional service-oriented architectures.\r\n<span style=\"font-weight: bold;\">What are the benefits of Service-Oriented Architecture?</span>\r\nThe main benefits of service-oriented architecture solutions are:\r\n<ul><li>Extensibility – easily able to expand or add to it.</li><li>Reusability – opportunity to reuse multi-purpose logic.</li><li>Maintainability – the ability to keep it up to date without having to remake and build the architecture again with the same configurations.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Service_Oriented_Architecture_and_Web_Services.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4938,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/ibm_filenet_p8_platform.png","logo":true,"scheme":false,"title":"IBM FileNet P8 Platform","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":100,"alias":"ibm-filenet-p8-platform","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"The FileNet P8 platform offers enterprise-level scalability and flexibility to handle the most demanding content challenges, the most complex business processes, and integration to all your existing systems. FileNet P8 is a reliable, scalable, and highly available enterprise platform that enables you to capture, store, manage, secure, and process information to increase operational efficiency and lower total cost of ownership. FileNet P8 enables you to streamline and automate business processes, access and manage all forms of content, and automate records management to help meet compliance needs.<br />\r\nThe FileNet P8 family of products includes back-end services, development tools, and applications that address enterprise content and process management requirements.\r\n<span style=\"font-weight: bold;\">Content management</span><br />At the core of the platform are repository services for capturing, managing, and storing your business-related digital assets. Multiple repositories, called object stores, can be created and managed within a single system to serve your business requirements.<br />\r\n<span style=\"font-weight: bold;\">Integration with external content repositories</span><br />\r\nIBM® FileNet Content Federation Services enables you to integrate data in an external repository with FileNet P8 and access the documents as though they are stored in an object store. An external repository acts like a virtual storage area for the Content Platform Engine system.<br />\r\n<span style=\"font-weight: bold;\">Workflow management</span><br />\r\nFileNet P8 lets you create, modify, manage, analyze, and simulate business processes, or workflows, that are performed by applications, enterprise users, and external users such as partners and customers.<br />\r\n<span style=\"font-weight: bold;\">Application environment</span><br />\r\nThe FileNet P8 platform includes an application environment to provide users with enterprise content management (ECM) functionality. IBM Content Navigator is a web client that provides users with a console for working with content from multiple content servers, including content that is stored on Content Platform Engine object stores.<br />\r\n<span style=\"font-weight: bold;\">Application integration</span><br />\r\nFileNet P8 tools help you integrate with various vendor applications.<br />\r\n<span style=\"font-weight: bold;\">Records management</span><br />\r\nDesigned to solve today's process-oriented enterprise records management and compliance needs, IBM Enterprise Records is a records management solution that can help companies manage risk through effective, enforceable records management policy, for achievable and cost-effective compliance. IBM Enterprise Records is fully integrated with the FileNet P8 platform.<br />\r\n<span style=\"font-weight: bold;\">System management</span><br />\r\nFileNet P8 provides a complete set of system administration tools that allow for monitoring, validation, and configuration changes from a central location with a dispersed deployment. These tools, described in the following sections, can be used to manage the entire system.<br />\r\n<span style=\"font-weight: bold;\">Enterprise capabilities</span><br />\r\nFileNet P8 components provide the enterprise-level capabilities that are required for solving critical business requirements. This section enumerates these product characteristics.","shortDescription":"IBM® FileNet® P8 Platform is a next-generation, unified enterprise foundation for the integrated IBM FileNet P8 products. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM FileNet P8 Platform","keywords":"","description":"The FileNet P8 platform offers enterprise-level scalability and flexibility to handle the most demanding content challenges, the most complex business processes, and integration to all your existing systems. FileNet P8 is a reliable, scalable, and highly avail","og:title":"IBM FileNet P8 Platform","og:description":"The FileNet P8 platform offers enterprise-level scalability and flexibility to handle the most demanding content challenges, the most complex business processes, and integration to all your existing systems. FileNet P8 is a reliable, scalable, and highly avail","og:image":"https://old.roi4cio.com/fileadmin/user_upload/ibm_filenet_p8_platform.png"},"eventUrl":"","translationId":4939,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":182,"title":"CMS - Content management system","alias":"cms-content-management-system","description":"A content management system (CMS) manages the creation and modification of digital content. It typically supports multiple users in a collaborative environment.\r\nCMS features vary widely. Most CMSs include Web-based publishing, format management, history editing and version control, indexing, search and retrieval. By their nature, content management systems support the separation of content and presentation.\r\nContent management software solutions are typically used for enterprise content management systems (ECM) and web site content management systems (WCM). An ECM facilitates collaboration in the workplace by integrating document management, digital asset management and records retention functionalities, and providing end users with role-based access to the organization's digital assets. A WCM facilitates collaborative authoring for websites. ECM software often includes a WCM publishing functionality, but ECM webpages typically remain behind the organization's firewall.\r\nBoth enterprise content management and web content management systems have two components: a content management application (CMA) and a content delivery application (CDA). The CMA is a graphical user interface (GUI) that allows the user to control the design, creation, modification and removal of content from a website without needing to know anything about HTML. The CDA component provides the back-end services that support management and delivery of the content once it has been created in the CMA.\r\nDigital asset management systems are another type of CMS. They manage content with a clearly defined author or ownership, such as documents, movies, pictures, phone numbers, and scientific data. Companies also use CMSs to store, control, revise, and publish documentation.\r\nBased on market share statistics, the most popular CMS is WordPress, used by more than 28% of all websites on the Internet, and by 59% of all websites using a known content management system, followed by Joomla and Drupal.\r\n<span style=\"font-weight: bold;\">Content management systems typically provide the following features:</span>\r\n<ul><li>Search engine optimization</li><li>Integrated and online documentation</li><li>Modularity and extensibility</li><li>User and group functionality</li><li>Templating support for changing designs</li><li>Installation and upgrade wizards</li><li>Integrated audit logs</li><li>Compliance with various accessibility frameworks and standards, such as WAI-ARIA</li><li>Reduced need to code from scratch</li><li>Unified user experience</li><li>Version control</li><li>Edit permission management</li></ul>","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What is a CMS?</span></h1>\r\nAnswer: CMS is an acronym for "Content Management System". You may see some variations on this term, but they all refer to the same concept. Variations include:\r\n<ul><li>Content Management System</li><li>Web CMS</li><li>Web Content Management System</li><li>CMS Platform</li><li>Content Management Platform</li><li>CMS System</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What does a CMS do?</span></h1>\r\n<p class=\"align-left\">In it's simplest terms, Content Management Systems are designed to help users create and manage their websites. Content management solutions help webmasters manage the many different resources, content types and various data that make up modern web sites.</p>\r\n<p class=\"align-left\">At a minimum, modern websites make use of HTML, CSS, JavaScript and images (jpeg, gif, png, etc) to create web content for visitors to read. At the core of every CMS is the ability to organize these resources and generate valid content that can be read by web browsers. </p>\r\n<p class=\"align-left\">More advanced websites have interactive components (comment sections, forums, e-commerce...) that requires server software to validate and save user submitted content.<br />All of the top CMS platforms have features built-in or available for download as addons for all of these features.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the main types of CMS?</span></h1>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Simple CMS.</span> This system is used to create simple websites that contain several pages using simple control systems. Simple content management systems consist of several modules that are set one time. These CMSs are free and are available on the internet. Among their disadvantages are the inability to change settings, low transmission capacity, inability to create pages dynamically and the inability of ato delegateion of administrator’s credentials to others.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"> </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Template CMS.</span> It consists of modules as well, but its structure is more complex if compared to a simple CMS. Template CMS has high transmission capacity, around 50,000 inquiries. Also, it has the support of dynamic pages and the ability to delegate the administrator’s credentials. Many template systems are used to create website content because they are easy to use.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"> </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Professional CMS</span>. This type of CMS has a higher level of complexity. You may change the structure of internet resources. Additional modules can be attached to these systems. These systems are used to create information portals or massive projects. As a rule, these CMSs are a paid resource.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"> </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Universal CMS</span>. Universal systems have wide functionality and ample opportunities to develope websites of any complexity. They support the functions of changing the structure, creating dynamic pages, modification of settings and credential distribution. Universal CMS is quite expensive. These CMSs are used for work with large portals and web-projects that require high functionality and dynamics.<br /><br /><br /><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CMS_-_content_management_system.png"},{"id":66,"title":"BPM - Business Process Management","alias":"bpm-business-process-management","description":"<span style=\"font-weight: bold; \">Business process management (BPM)</span> is a discipline in operations management in which people use various methods to discover, model, analyze, measure, improve, optimize, and automate business processes. BPM focuses on improving corporate performance by managing business processes. Any combination of methods used to manage a company's business processes is BPM. Processes can be structured and repeatable or unstructured and variable.\r\nAs an approach, BPM sees processes as important assets of an organization that must be understood, managed, and developed to announce and deliver value-added products and services to clients or customers. This approach closely resembles other total quality management or continuous improvement process methodologies. ISO 9000 promotes the process approach to managing an organization.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Successfully employing BPM usually involves the following:</span>\r\nOrganizing around outcomes not tasks to ensure the proper focus is maintained\r\nCorrecting and improving processes before (potentially) automating them; otherwise all you’ve done is make the mess run faster\r\nEstablishing processes and assigning ownership lest the work and improvements simply drift away – and they will, as human nature takes over and the momentum peters out\r\nStandardizing processes across the enterprise so they can be more readily understood and managed, errors reduced, and risks mitigated\r\nEnabling continuous change so the improvements can be extended and propagated over time\r\nImproving existing processes, rather than building radically new or “perfect” ones, because that can take so long as to erode or negate any gains achieved\r\n<span style=\"font-weight: bold; \">Business Process Management Software (BPMS)</span> is a process automation tool. It helps you map out your everyday processes to identify and eliminate bottlenecks, control your company’s costs, make your day-to-day processes as efficient as possible, and ensure the effectiveness of the people involved in your processes. A business process management solution to a company’s needs begins with the alignment of business goals with an eye toward creating value through process change initiatives. This alignment leads to a thorough understanding and design of representative processes typically following an industry standard framework \r\nA BPM based foundation provides for complete lifecycle management of business processes, integration across technologies, and imbeds efficiency among people, processes, and technologies.\r\nCommercial business process management tools tend to center on the automation of business processes, essentially moving them from manual pen-and-paper endeavors to effortless automated transactions. BPM software products track how business information is used and then maps the relevant business process and ensure that transactions are done accordingly. This effectively shows where data and process bottlenecks occur and highlights various deficiencies in business processes, including areas where resources are wasted, allowing managers streamline and optimize those processes.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">There are three key types of BPMS:</span></p>\r\n<span style=\"font-weight: bold; \">Efficiency Monitors:</span>Monitors every system of the enterprise for inefficiency in the processes by following it from start to finish. BPM program accurately pinpoints weakness and bottlenecks where customers might get frustrated and discontinue transactions and processes.\r\n<span style=\"font-weight: bold; \">Workflow Software:</span> Uses detailed maps of an existing processes and tries to streamline them by optimizing certain steps. BPM workflow software cannot suggest improvements to the process, only optimize it, so this software is only as good as the process itself.\r\n<span style=\"font-weight: bold; \">Enterprise Application Integration Tools:</span> A mixture of efficiency monitors, process and workflow management, EAI software is used to integrate legacy systems into new systems. This software can be used to map points for integrating old and new systems, optimizing their information-gathering characteristics and increasing the efficiency of system communications.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\">What Are the Types of Business Process Management Software?</h1>\r\n<p class=\"align-center\">There are <span style=\"font-weight: bold; \">three basic kinds</span> of BPM frameworks:</p>\r\n<span style=\"font-weight: bold; \">Horizontal frameworks.</span>They deal with design and development of business processes. They are generally focused on technology and reuse.\r\n<span style=\"font-weight: bold; \">Vertical BPM frameworks.</span> This focuses on specific sets of coordinated tasks, using pre-built templates which can be easily deployed and configured.\r\n<span style=\"font-weight: bold; \">Full-service BPM suites.</span> They have five basic components: Process discovery and project scoping; Process modeling and design; Business rules engine; Workflow engine; Simulation and testing.\r\n<p class=\"align-center\">There are <span style=\"font-weight: bold; \">two types of BPM software</span> as it pertains to deployment:<span style=\"font-weight: bold; \"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">On-premise</span> business process management (BPM). This has been the norm for most enterprises.</p>\r\n<span style=\"font-weight: bold; \">Software as a Service (SaaS).</span> Advances in cloud computing have led to an increased interest in various “software-on-demand” offerings.\r\n<h1 class=\"align-center\">What are BPM Tools?</h1>\r\n<span style=\"font-weight: bold; \">Business Process Management (BPM) tools</span> are used for automating, measuring and optimizing business processes. BPM automation tools use workflow and collaboration to provide meaningful metrics to business leaders.\r\n<span style=\"font-weight: bold; \">Misconceptions about BPM Tools.</span> There’s a common misconception that BPM tools do not easily demonstrate their benefit to the organization. While the benefit from using BPM tools can be hard to quantify, it can be expressed more effectively in terms of business value.\r\n<span style=\"font-weight: bold; \">Process Management Tools.</span> Tools that allow process managers (those that are responsible for organizing the process or activity) to secure the resources needed to execute it, and measure the results of the activity, providing rewards or corrective feedback when necessary. Process manager tools also allows process managers to change and improve the process whenever possible.\r\n<span style=\"font-weight: bold;\">Process Modeling Tools.</span> Software tools that let managers or analysts create business process diagrams. Simple tools only support diagramming. Professional Process Modeling Tools store each model element in a database so that they can be reused on other diagrams or updated. Many business process improvement software supports simulation or code generation.<br /><br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/BPM_-_Business_Process_Management.png"},{"id":146,"title":"ECM - Enterprise Content Management","alias":"ecm-enterprise-content-management","description":"<span style=\"font-weight: bold; \">Enterprise content management (ECM)</span> extends the concept of content management by adding a time line for each content item and possibly enforcing processes for the creation, approval and distribution of them. Systems that implement ECM generally provide a secure repository for managed items, be they analog or digital, that indexes them. They also include one or more methods for importing content to bring new items under management and several presentation methods to make items available for use. The key feature of ECM that distinguishes it from "simple" content management is that an ECM is at least cognizant of the processes and procedures of the enterprise it is created for, and as such is particular to it. \r\nECM as an umbrella term covers enterprise document management system, Web content management, search, collaboration, records management, digital asset management (DAM), workflow management, capture and scanning. ECM is primarily aimed at managing the life-cycle of information from initial publication or creation all the way through archival and eventual disposal. ECM enterprise content management software is delivered in four ways:\r\n- on-premises software (installed on an organization's own network)\r\n- software as a service (SaaS) (Web access to information that is stored on a software manufacturer's system)\r\n- a hybrid composed of both on-premises and SaaS components\r\n- Infrastructure as a Service (IaaS) (which refers to online services that abstract the user from the details of infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc.)\r\n<span style=\"font-weight: bold;\">ECM provides</span> a centralized platform where content can be held and disseminated in a manner that meets regulatory compliance requirements and risk management guidelines. An ECM achieves the latter two benefits by eliminating ad hoc processes that can expose an enterprise to regulatory compliance risks and other potential problems. Full-function enterprise content management solutions include features such as content taxonomies, auditing capabilities, check-in/check-out and other workflow controls and security mechanisms.\r\nAn <span style=\"font-weight: bold;\">effective ECM </span>can streamline access and business processes, eliminate bottlenecks by reducing storage, as well as paper and mailing needs, optimize security, maintain integrity and minimize overhead. All of these can lead to increased productivity. The first step is to document all the types of content that the organization deals with, the business processes its part of and who handles the content. \r\nECM software can be used to identify duplicate and near-duplicate content, allowing the organization to keep a few copies of a particular piece of content instead of hundreds. The best ECM software extends the reach of traditional ECM capabilities into previously isolated applications and information silos, such as ERP, CRM, SCM and HCM, to take the shape of a content services platform. Information can now flow across the enterprise to the people and processes—when, where and in whatever context it is needed.\r\nTo understand more specific ways it could help your company, consider these <span style=\"font-weight: bold; \">three types of ECM</span> software solutions.\r\n<span style=\"font-weight: bold; \">Web Content Management.</span> WCM puts control over the look and feel of a website in the hands of specific, key people. It’s used by organizations with relatively complex websites and strict brand guidelines, giving those key personnel the means to easily update, modify and publish content for the sites while adhering to the guidelines.\r\n<span style=\"font-weight: bold; \">Collaborative Content Management.</span> CCM enables multiple people to access and modify a single document, such as a legal document. It’s ideal for organizations that must manage projects involving multiple stakeholders. CCM makes it easy to work together while keeping track of, and updating, the most-current version of the document.\r\n<span style=\"font-weight: bold; \">Transactional Content Management.</span> This type of ECM document management is designed for organizations that repeatedly use varied types of content, including records, paper documents, and digital files. TCM solutions capture content from various channels, classify it, store it, create an automated workflow to ensure the right user receives the content at the right time, and even deletes documents when they’re no longer needed, all while working seamlessly with other apps and databases, ensuring all of that content is available throughout the company.<br /><br /><br />\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: bold; \">What is Enterprise Content Management (ECM)?</span></h1>\r\nEnterprise Content Management is the organization of structured and unstructured documents using technology and software that allows your organization to “work smarter, not harder.” As technology advanced and everything became digital, organizations needed a new way to store and access files, leading to the creation of ECM. \r\nECM document management system consists of four main points:\r\n<ul><li><span style=\"font-weight: bold; \">Capture:</span> Capturing information from hardcopy documents or online forms and transferring it into the system</li><li><span style=\"font-weight: bold; \">Manage:</span> Managing the captured data in a structured format that allows quick and easy retrieval</li><li><span style=\"font-weight: bold; \">Storing:</span> Securely storing files in a central repository that can be accessed from multiple locations</li><li><span style=\"font-weight: bold; \">Delivery:</span> Implementation of business process workflows to automatically move documents from one step to the next</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Five ways ECM software can benefit your organization</span></h1>\r\n<span style=\"font-weight: bold; \">Basic file sharing and library services.</span> At its core, enterprise document management software begins with basic file sharing and library services managed within a networked repository. Individuals and groups with predefined access rights and permissions can access the repository and then create, read, update and delete files stored within it.\r\nMany ECM applications support Content Management Interoperability Services, an industry standard that allows different vendors' products to interoperate; this is an essential capability within large enterprises that maintain content management tools from multiple vendors.\r\n<span style=\"font-weight: bold; \">Content governance, compliance and records management.</span> For many organizations, managing business documents or other content types is a critical use case for ECM. Companies subject to compliance or other industry regulations need document content management system software to capture, manage, archive and ultimately dispose of files after a predefined period.\r\nECM can ensure that only individuals with predefined permissions - determined by access controls - can update or view documents stored within a repository. An organization can thus manage document modification.\r\nIn addition, enterprise content management tools can log all actions, providing an organization with the capabilities to maintain an auditable record of all the changes to documents within the repository.\r\n<span style=\"font-weight: bold; \">Business process management.</span> Companies also use ECM to establish workflows that span departments and geographies to support extended enterprise and inter-enterprise business processes.\r\nMost ECM software provides tools to help both technical and non-technical business users define business processes. Most applications provide audit controls to track each step of the process and analytic capabilities to help identify inefficiencies and streamline business procedures.\r\n<span style=\"font-weight: bold; \">Content repositories linked to other enterprise applications.</span> Some companies use electronic content management software as a repository for documents created by other enterprise applications, including CRM, ERP, HR and financial systems. These enterprise systems can seamlessly access, view or modify content managed by the ECM.\r\n<span style=\"font-weight: bold; \">Enabling mobile and remote workforces.</span> Content management tools often include functionality to allow remote workers to access content from mobile devices. This is an increasingly important feature for many companies.\r\nMobile capabilities also enable new kinds of data capture and presentation functionalities. By combining content management capabilities with other data, for example, a political canvasser can use a tablet to enter new information about a political donor without having to start from scratch, as some of that information is already stored in a content management system. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/ECM_-_Enterprise_Content_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3408,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg","logo":true,"scheme":false,"title":"McAfee Active Response","vendorVerified":1,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":110,"alias":"mcafee-active-response","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"McAfee Active Response - Comprehensive endpoint detection and response.\r\n<span style=\"color: rgb(97, 97, 97); \">McAfee Active Response delivers continuous detection of and response to advanced security threats to help security practitioners monitor security posture, improve threat detection, and expand incident response capabilities through forward-looking discovery, detailed analysis, forensic investigation, comprehensive reporting, and prioritized alerts and actions.<br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \">McAfee Active Response is proof of the effectiveness of the integrated McAfee security architecture, which is designed to resolve more threats faster and with fewer resources in a more complex world. McAfee Active Response gives you continuous visibility and powerful insights into your endpoints so you can identify breaches faster. And it provides you with the tools you need to correct issues faster and in the way that makes the most sense for your business. All of this power is managed via McAfee® ePolicy Orchestrator® (McAfee ePO™) software leveraging McAfee Data Exchange Layer—this provides unified scalability and extensibility without the need for incremental staff to administer the product.<br /><br /><span style=\"font-weight: bold;\">Key Advantages</span><br /></span>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Automated: Capture and monitor context and system state for changes that may be IoAs, as well as find dormant attack components, and send intelligence to analytics, operations, and forensic teams.</span></li></ul>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Adaptable: When alerted, you can adjust to changes in attack methodologies; automate data collection, alerts, and responses to objects of interest; and customize your configuration to customer workflows.</span></li></ul>\r\n<ul><li><span style=\"color: rgb(97, 97, 97); \">Continuous: Persistent collectors activate triggers on detection of attack events, alerting you and your systems to attack activity that you</span></li></ul>\r\n<span style=\"color: rgb(97, 97, 97); \"><br /><br /><br /><br /></span>\r\n<br /><br />","shortDescription":"McAfee Active Response is a leading innovation in finding and responding to advanced threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Active Response","keywords":"","description":"McAfee Active Response - Comprehensive endpoint detection and response.\r\n<span style=\"color: rgb(97, 97, 97); \">McAfee Active Response delivers continuous detection of and response to advanced security threats to help security practitioners monitor security po","og:title":"McAfee Active Response","og:description":"McAfee Active Response - Comprehensive endpoint detection and response.\r\n<span style=\"color: rgb(97, 97, 97); \">McAfee Active Response delivers continuous detection of and response to advanced security threats to help security practitioners monitor security po","og:image":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg"},"eventUrl":"","translationId":3409,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3410,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg","logo":true,"scheme":false,"title":"McAfee Cloud Workload Security","vendorVerified":1,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":110,"alias":"mcafee-cloud-workload-security","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":" McAfee® Cloud Workload Security (McAfee® CWS) automates the discovery and defense of elastic workloads and containers to eliminate blind spots, deliver advanced threat defense, and simplify multicloud management. McAfee provides protection that makes it possible for a single, automated policy to effectively secure your workloads as they transition through your virtual private, public, and multicloud environments, enabling operational excellence for your cybersecurity teams.\r\n<span style=\"font-weight: bold; \">Automate discovery and deployment</span>\r\nContinuous workload discovery gives you a centralized perspective of all instances across your Amazon Web Services (AWS), Microsoft Azure, and VMware accounts, while automation templates ensure your workloads are protected from the start.\r\n<span style=\"font-weight: bold; \">Visualize and control network threats</span>\r\nTraditional perimeter-based security doesn’t work across hybrid workloads due to their amorphous and decentralized nature. Cloud-native network visualization, prioritized risk alerting, and micro-segmentation deliver awareness and control to prevent both lateral attacks in the data center and external threats\r\n<span style=\"font-weight: bold; \">Defend workloads against advanced attacks</span>\r\nIntegrated countermeasures spanning machine learning, application containment, virtual machine-optimized anti-malware, whitelisting, file integrity monitoring, and micro-segmentation, protect workloads from threats like ransomware and targeted attacks.\r\n<span style=\"font-weight: bold; \">Simplify cloud security management</span>\r\nA single-pane console consolidates security policy and management across physical endpoints, servers, virtual servers and desktops, and hybrid and multi-cloud environments. Isolation allows you to use micro-segmentation to quarantine workloads and containers with a single click.\r\n\r\n<span style=\"font-weight: bold; \">SECURITY BUILD FOR THE CLOUD</span>\r\n<span style=\"text-decoration: underline; \">Cloud and DevOps integration</span>\r\nMcAfee Cloud Workload Security works directly with AWS, Microsoft Azure, and VMware environments to provide continuous visibility, while delivering deployment automation through common DevOps tool support (Chef, Puppet, and shell scripts).\r\n<span style=\"text-decoration: underline; \">Optimized for virtual workloads</span>\r\nLeverage advanced host-based workload defense optimized specifically for virtual instances to avoid resource storms that can strain underlying infrastructure.<br /><br /><span style=\"text-decoration: underline; \">Cloud-native network control</span>\r\nWith increased awareness and control of your cloud workloads you can prevent both lateral attacks in the data center and external threats.<br /><br /><span style=\"text-decoration: underline; \">Cloud provider direct integration</span>\r\nAdditional capabilities are enabled through direct integration with cloud providers such as AWS. For example, AWS GuardDuty alerts integrate directly into McAfee ePO, displaying network connections, port probes, and DNS requests for EC2 instances.\r\n\r\nMcAfee Cloud Workload Security:\r\n<ul><li>McAfee Cloud Workload Security Basic</li></ul>\r\n<ul><li>McAfee Cloud Workload Security Essentials</li></ul>\r\n<ul><li>McAfee Cloud Workload Security Advanced</li></ul>","shortDescription":"McAfee Cloud Workload Security secures your hybrid infrastructure workloads","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Cloud Workload Security","keywords":"","description":" McAfee® Cloud Workload Security (McAfee® CWS) automates the discovery and defense of elastic workloads and containers to eliminate blind spots, deliver advanced threat defense, and simplify multicloud management. McAfee provides protection that makes it ","og:title":"McAfee Cloud Workload Security","og:description":" McAfee® Cloud Workload Security (McAfee® CWS) automates the discovery and defense of elastic workloads and containers to eliminate blind spots, deliver advanced threat defense, and simplify multicloud management. McAfee provides protection that makes it ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg"},"eventUrl":"","translationId":3411,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":5,"title":"Security Software","alias":"security-software","description":" Computer security software or cybersecurity software is any computer program designed to enhance information security. Security software is a broad term that encompasses a suite of different types of software that deliver data and computer and network security in various forms. \r\nSecurity software can protect a computer from viruses, malware, unauthorized users and other security exploits originating from the Internet. Different types of security software include anti-virus software, firewall software, network security software, Internet security software, malware/spamware removal and protection software, cryptographic software, and more.\r\nIn end-user computing environments, anti-spam and anti-virus security software is the most common type of software used, whereas enterprise users add a firewall and intrusion detection system on top of it. \r\nSecurity soft may be focused on preventing attacks from reaching their target, on limiting the damage attacks can cause if they reach their target and on tracking the damage that has been caused so that it can be repaired. As the nature of malicious code evolves, security software also evolves.<span style=\"font-weight: bold; \"></span>\r\n<span style=\"font-weight: bold; \">Firewall. </span>Firewall security software prevents unauthorized users from accessing a computer or network without restricting those who are authorized. Firewalls can be implemented with hardware or software. Some computer operating systems include software firewalls in the operating system itself. For example, Microsoft Windows has a built-in firewall. Routers and servers can include firewalls. There are also dedicated hardware firewalls that have no other function other than protecting a network from unauthorized access.\r\n<span style=\"font-weight: bold; \">Antivirus.</span> Antivirus solutions work to prevent malicious code from attacking a computer by recognizing the attack before it begins. But it is also designed to stop an attack in progress that could not be prevented, and to repair damage done by the attack once the attack abates. Antivirus software is useful because it addresses security issues in cases where attacks have made it past a firewall. New computer viruses appear daily, so antivirus and security software must be continuously updated to remain effective.\r\n<span style=\"font-weight: bold; \">Antispyware.</span> While antivirus software is designed to prevent malicious software from attacking, the goal of antispyware software is to prevent unauthorized software from stealing information that is on a computer or being processed through the computer. Since spyware does not need to attempt to damage data files or the operating system, it does not trigger antivirus software into action. However, antispyware software can recognize the particular actions spyware is taking by monitoring the communications between a computer and external message recipients. When communications occur that the user has not authorized, antispyware can notify the user and block further communications.\r\n<span style=\"font-weight: bold; \">Home Computers.</span> Home computers and some small businesses usually implement security software at the desktop level - meaning on the PC itself. This category of computer security and protection, sometimes referred to as end-point security, remains resident, or continuously operating, on the desktop. Because the software is running, it uses system resources, and can slow the computer's performance. However, because it operates in real time, it can react rapidly to attacks and seek to shut them down when they occur.\r\n<span style=\"font-weight: bold; \">Network Security.</span> When several computers are all on the same network, it's more cost-effective to implement security at the network level. Antivirus software can be installed on a server and then loaded automatically to each desktop. However firewalls are usually installed on a server or purchased as an independent device that is inserted into the network where the Internet connection comes in. All of the computers inside the network communicate unimpeded, but any data going in or out of the network over the Internet is filtered trough the firewall.<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal; \">What is IT security software?</span></h1>\r\nIT security software provides protection to businesses’ computer or network. It serves as a defense against unauthorized access and intrusion in such a system. It comes in various types, with many businesses and individuals already using some of them in one form or another.\r\nWith the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations. Since more and more businesses are now relying their crucial operations on software products, the importance of security system software assurance must be taken seriously – now more than ever. Having reliable protection such as a security software programs is crucial to safeguard your computing environments and data. \r\n<p class=\"align-left\">It is not just the government or big corporations that become victims of cyber threats. In fact, small and medium-sized businesses have increasingly become targets of cybercrime over the past years. </p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal; \">What are the features of IT security software?</span></h1>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Automatic updates. </span>This ensures you don’t miss any update and your system is the most up-to-date version to respond to the constantly emerging new cyber threats.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Real-time scanning.</span> Dynamic scanning features make it easier to detect and infiltrate malicious entities promptly. Without this feature, you’ll risk not being able to prevent damage to your system before it happens.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Auto-clean.</span> A feature that rids itself of viruses even without the user manually removing it from its quarantine zone upon detection. Unless you want the option to review the malware, there is no reason to keep the malicious software on your computer which makes this feature essential.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Multiple app protection.</span> This feature ensures all your apps and services are protected, whether they’re in email, instant messenger, and internet browsers, among others.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application level security.</span> This enables you to control access to the application on a per-user role or per-user basis to guarantee only the right individuals can enter the appropriate applications.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Role-based menu.</span> This displays menu options showing different users according to their roles for easier assigning of access and control.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Row-level (multi-tenant) security.</span> This gives you control over data access at a row-level for a single application. This means you can allow multiple users to access the same application but you can control the data they are authorized to view.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Single sign-on.</span> A session or user authentication process that allows users to access multiple related applications as long as they are authorized in a single session by only logging in their name and password in a single place.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">User privilege parameters.</span> These are customizable features and security as per individual user or role that can be accessed in their profile throughout every application.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold; \">Application activity auditing.</span> Vital for IT departments to quickly view when a user logged in and off and which application they accessed. Developers can log end-user activity using their sign-on/signoff activities.</li></ul>\r\n<p class=\"align-left\"><br /><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Security_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4956,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IBM_BladeCenter.jpg","logo":true,"scheme":false,"title":"IBM BladeCenter","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":100,"alias":"ibm-bladecenter","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"Introduced in 2002, based on engineering work started in 1999, the IBM BladeCenter was relatively late to the blade server market. It differed from prior offerings in that it offered a range of x86 Intel server processors and input/output (I/O) options. In February 2006, IBM introduced the BladeCenter H with switch capabilities for 10 Gigabit Ethernet and InfiniBand 4X.<br />A web site called Blade.org was available for the blade computing community through about 2009.<br />In 2012 the replacement Flex System was introduced.<br /><span style=\"font-weight: bold;\"><br />IBM BladeCenter (E)</span>\r\nThe original IBM BladeCenter was later marketed as BladeCenter E[3] with 14 blade slots in 7U. Power supplies have been upgraded through the life of the chassis from the original 1200 to 1400, 1800, 2000 and 2320 watt.<br />\r\nThe BladeCenter (E) was co-developed by IBM and Intel and included:\r\n<ul><li>14 blade slots in 7U</li></ul>\r\n<ul><li>Shared media tray with optical drive, floppy drive and USB 1.1 port</li></ul>\r\n<ul><li>One (upgradable to two) management modules</li></ul>\r\n<ul><li>Two (upgradable to four) power supplies</li></ul>\r\n<ul><li>Two redundant high-speed blowers</li></ul>\r\n<ul><li>Two slots for Gigabit Ethernet switches (can also have optical or copper pass-through)</li></ul>\r\n<ul><li>Two slots for optional switch or pass-through modules, can have additional Ethernet, Fibre Channel, InfiniBand or Myrinet 2000 functions.</li></ul>\r\n<br /><span style=\"font-weight: bold;\">IBM BladeCenter T</span><br />\r\nBladeCenter T is the telecommunications company version of the original IBM BladeCenter, available with either AC or DC (48 V) power. Has 8 blade slots in 8U, but uses the same switches and blades as the regular BladeCenter E. To keep NEBS Level 3 / ETSI compliant special Network Equipment-Building System (NEBS) compliant blades are available.<br /><br /><span style=\"font-weight: bold;\">IBM BladeCenter H</span><br />\r\nUpgraded BladeCenter design with high-speed fabric options. Fits 14 blades in 9U. Backwards compatible with older BladeCenter switches and blades.\r\n<ul><li>14 blade slots in 9U</li></ul>\r\n<ul><li>Shared Media tray with Optical Drive and USB 2.0 port</li></ul>\r\n<ul><li>One (upgradable to two) Advanced Management Modules</li></ul>\r\n<ul><li>Two (upgradable to four) Power supplies</li></ul>\r\n<ul><li>Two redundant High-speed blowers</li></ul>\r\n<ul><li>Two slots for Gigabit Ethernet switches (can also have optical or copper pass-through)</li></ul>\r\n<ul><li>Two slots for optional switch or pass-through modules, can have additional Ethernet, Fibre Channel, InfiniBand or Myrinet 2000 functions.</li></ul>\r\n<ul><li>Four slots for optional high-speed switches or pass-through modules, can have 10 Gbit Ethernet or InfiniBand 4X.</li></ul>\r\n<ul><li>Optional Hard-wired serial port capability</li></ul>\r\n<br /><span style=\"font-weight: bold;\">IBM BladeCenter HT</span><br />\r\nBladeCenter HT is the telecommunications company version of the IBM BladeCenter H, available with either AC or DC (48 V) power. Has 12 blade slots in 12U, but uses the same switches and blades as the regular BladeCenter H. But to keep NEBS Level 3 / ETSI compliant special NEBS compliant blades are available.<br /><br /><span style=\"font-weight: bold;\">IBM BladeCenter S</span><br />\r\nTargets mid-sized customers by offering storage inside the BladeCenter chassis, so no separate external storage needs to be purchased. It can also use 110 V power in the North American market, so it can be used outside the datacenter. When running at 120 V , the total chassis capacity is reduced.\r\n<ul><li>6 blade slots in 7U</li></ul>\r\n<ul><li>Shared Media tray with Optical Drive and 2x USB 2.0 ports</li></ul>\r\n<ul><li>Up to 12 hot-swap 3.5" (or 24 2.5") SAS or SATA drives with RAID 0, 1 and 1E capability, RAID 5 and SAN capabilities optional with two SAS RAID controllers</li></ul>\r\n<ul><li>Two optional Disk Storage Modules for HDDs, six 3.5-inch SAS/SATA drives each.</li></ul>\r\n<ul><li>4 hot-swap I/O switch module bays</li></ul>\r\n<ul><li>1 Advanced Management Module as standard (no option for secondary Management Module)</li></ul>\r\n<ul><li>Two 950/1450-watt, hot-swap power modules and ability to have two optional 950/1450-watt power modules, offering redundancy and power for robust configurations.</li></ul>\r\n<ul><li>Four hot-swap redundant blowers, plus one fan in each power supply.</li></ul>","shortDescription":"The IBM BladeCenter was IBM's blade server architecture, until it was replaced by Flex System.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM BladeCenter","keywords":"","description":"Introduced in 2002, based on engineering work started in 1999, the IBM BladeCenter was relatively late to the blade server market. It differed from prior offerings in that it offered a range of x86 Intel server processors and input/output (I/O) options. In Feb","og:title":"IBM BladeCenter","og:description":"Introduced in 2002, based on engineering work started in 1999, the IBM BladeCenter was relatively late to the blade server market. It differed from prior offerings in that it offered a range of x86 Intel server processors and input/output (I/O) options. In Feb","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IBM_BladeCenter.jpg"},"eventUrl":"","translationId":4957,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":517,"title":"Blade System","alias":"blade-system","description":" A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical space and energy. Blade servers have many components removed to save space, minimize power consumption and other considerations, while still having all the functional components to be considered a computer. Unlike a rack-mount server, a blade server needs a blade enclosure, which can hold multiple blade servers, providing services such as power, cooling, networking, various interconnects and management. Together, blades and the blade enclosure form a blade system. Different blade providers have differing principles regarding what to include in the blade itself, and in the blade system as a whole.\r\nIn a standard server-rack configuration, one rack unit or 1U—19 inches (480 mm) wide and 1.75 inches (44 mm) tall—defines the minimum possible size of any equipment. The principal benefit and justification of blade computing relates to lifting this restriction so as to reduce size requirements. The most common computer rack form-factor is 42U high, which limits the number of discrete computer devices directly mountable in a rack to 42 components. Blades do not have this limitation. As of 2014, densities of up to 180 servers per blade system (or 1440 servers per rack) are achievable with blade systems.\r\nEnclosure (or chassis) performs many of the non-core computing services found in most computers. Non-blade systems typically use bulky, hot and space-inefficient components, and may duplicate these across many computers that may or may not perform at capacity. By locating these services in one place and sharing them among the blade computers, the overall utilization becomes higher. The specifics of which services are provided varies by vendor.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Power.</span></span> Computers operate over a range of DC voltages, but utilities deliver power as AC, and at higher voltages than required within computers. Converting this current requires one or more power supply units (or PSUs). To ensure that the failure of one power source does not affect the operation of the computer, even entry-level servers may have redundant power supplies, again adding to the bulk and heat output of the design.\r\nThe blade enclosure's power supply provides a single power source for all blades within the enclosure. This single power source may come as a power supply in the enclosure or as a dedicated separate PSU supplying DC to multiple enclosures. This setup reduces the number of PSUs required to provide a resilient power supply.\r\nThe popularity of blade servers, and their own appetite for power, has led to an increase in the number of rack-mountable uninterruptible power supply (or UPS) units, including units targeted specifically towards blade servers (such as the BladeUPS).\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Cooling.</span></span> During operation, electrical and mechanical components produce heat, which a system must dissipate to ensure the proper functioning of its components. Most blade enclosures, like most computing systems, remove heat by using fans.\r\nA frequently underestimated problem when designing high-performance computer systems involves the conflict between the amount of heat a system generates and the ability of its fans to remove the heat. The blade's shared power and cooling means that it does not generate as much heat as traditional servers. Newer blade-enclosures feature variable-speed fans and control logic, or even liquid cooling systems that adjust to meet the system's cooling requirements.\r\nAt the same time, the increased density of blade-server configurations can still result in higher overall demands for cooling with racks populated at over 50% full. This is especially true with early-generation blades. In absolute terms, a fully populated rack of blade servers is likely to require more cooling capacity than a fully populated rack of standard 1U servers. This is because one can fit up to 128 blade servers in the same rack that will only hold 42 1U rack mount servers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Networking.</span></span> Blade servers generally include integrated or optional network interface controllers for Ethernet or host adapters for Fibre Channel storage systems or converged network adapter to combine storage and data via one Fibre Channel over Ethernet interface. In many blades at least one interface is embedded on the motherboard and extra interfaces can be added using mezzanine cards.\r\nA blade enclosure can provide individual external ports to which each network interface on a blade will connect. Alternatively, a blade enclosure can aggregate network interfaces into interconnect devices (such as switches) built into the blade enclosure or in networking blades.\r\nBlade servers function well for specific purposes such as web hosting, virtualization, and cluster computing. Individual blades are typically hot-swappable. As users deal with larger and more diverse workloads, they add more processing power, memory and I/O bandwidth to blade servers. Although blade server technology in theory allows for open, cross-vendor system, most users buy modules, enclosures, racks and management tools from the same vendor.\r\nEventual standardization of the technology might result in more choices for consumers; as of 2009 increasing numbers of third-party software vendors have started to enter this growing field.\r\nBlade servers do not, however, provide the answer to every computing problem. One can view them as a form of productized server-farm that borrows from mainframe packaging, cooling, and power-supply technology. Very large computing tasks may still require server farms of blade servers, and because of blade servers' high power density, can suffer even more acutely from the heating, ventilation, and air conditioning problems that affect large conventional server farms.","materialsDescription":" <span style=\"font-weight: bold;\">What is blade server?</span>\r\nA blade server is a server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application. The blades are literally servers on a card, containing processors, memory, integrated network controllers, an optional Fiber Channel host bus adaptor (HBA) and other input/output (IO) ports.\r\nBlade servers allow more processing power in less rack space, simplifying cabling and reducing power consumption. According to a SearchWinSystems.com article on server technology, enterprises moving to blade servers can experience as much as an 85% reduction in cabling for blade installations over conventional 1U or tower servers. With so much less cabling, IT administrators can spend less time managing the infrastructure and more time ensuring high availability.\r\nEach blade typically comes with one or two local ATA or SCSI drives. For additional storage, blade servers can connect to a storage pool facilitated by a network-attached storage (NAS), Fiber Channel, or iSCSI storage-area network (SAN). The advantage of blade servers comes not only from the consolidation benefits of housing several servers in a single chassis, but also from the consolidation of associated resources (like storage and networking equipment) into a smaller architecture that can be managed through a single interface.\r\nA blade server is sometimes referred to as a high-density server and is typically used in a clustering of servers that are dedicated to a single task, such as:\r\n<ul><li>File sharing</li><li>Web page serving and caching</li><li>SSL encrypting of Web communication</li><li>The transcoding of Web page content for smaller displays</li><li>Streaming audio and video content</li></ul>\r\nLike most clustering applications, blade servers can also be managed to include load balancing and failover capabilities.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Blade_System.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4962,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IBM_LOGO.png","logo":true,"scheme":false,"title":"IBM POWER8 Server","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":100,"alias":"server-ibm-power8","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"Reflecting the best in open source, big-data computing, IBM POWER8® servers offer the overwhelming processing strength of Linux on IBM Power® and the ability to engage in deep learning.<br />POWER8 servers provide easy-to-deploy cloud solutions and support SAP HANA workloads. POWER8 servers also work in conjunction with IBM Watson® — actually helping to make Watson even smarter.\r\n\r\n<span style=\"font-weight: bold;\">FEATURES</span><br />\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Parallel processing power</span></span><br />\r\nThe POWER8 server delivers parallel processing of data queries, enabling it to resolve queries faster than other processor architectures.<br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\"></span></span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Boosted memory bandwidth</span></span><br />\r\nComputer-assisted personal interface (CAPI) enables the processor to talk directly to the flash drives and use them as an extension of its own memory. The data being cached for in-memory databases can be accessed faster than on any other platform.<br /><br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Complex analytical capabilities </span></span><br />\r\nIBM Watson ingests large amounts of structured and semi-structured data, making it ideal for environments that previously would have taken several data scientists to develop the necessary queries to extract key information from the data. <br /><br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Cost savings with cloud computing</span></span><br />\r\nCompanies can achieve significant cost savings by using cloud computing to help them more intelligently manage, store and access data.<br /><br /><span style=\"font-weight: bold;\">BENEFITS</span><br />\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Gain fast access to Linux compute in the cloud</span></span><br />\r\nEasily extend your current infrastructure into the cloud and get developers up and running on Linux fast. <br /><br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Host data and analytics in Linux</span></span><br />\r\nTest, drive and port data and analytics solutions to Linux. Get a secure environment to prove out performance characteristics for Linux workloads. <br /><br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Integrate hybrid applications</span></span><br />\r\nMaximize performance and efficiency by ensuring systems are close to the data being analyzed. ","shortDescription":"IBM POWER8 servers combine high performance, storage and I/O to focus on increasing volumes of data, while maintaining system speed.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM POWER8 Server","keywords":"","description":"Reflecting the best in open source, big-data computing, IBM POWER8® servers offer the overwhelming processing strength of Linux on IBM Power® and the ability to engage in deep learning.<br />POWER8 servers provide easy-to-deploy cloud solutions and support SAP","og:title":"IBM POWER8 Server","og:description":"Reflecting the best in open source, big-data computing, IBM POWER8® servers offer the overwhelming processing strength of Linux on IBM Power® and the ability to engage in deep learning.<br />POWER8 servers provide easy-to-deploy cloud solutions and support SAP","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IBM_LOGO.png"},"eventUrl":"","translationId":4963,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":35,"title":"Server","alias":"server","description":"In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients". This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client. A single server can serve multiple clients, and a single client can use multiple servers. A client process may run on the same device or may connect over a network to a server on a different device. Typical servers are database servers, file servers, mail servers, print servers, web servers, game servers, and application servers.\r\nClient–server systems are today most frequently implemented by (and often identified with) the request–response model: a client sends a request to the server, which performs some action and sends a response back to the client, typically with a result or acknowledgement. Designating a computer as "server-class hardware" implies that it is specialized for running servers on it. This often implies that it is more powerful and reliable than standard personal computers, but alternatively, large computing clusters may be composed of many relatively simple, replaceable server components.\r\nStrictly speaking, the term server refers to a computer program or process (running program). Through metonymy, it refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host. In addition to server, the words serve and service (as noun and as verb) are frequently used, though servicer and servant are not. The word service (noun) may refer to either the abstract form of functionality, e.g. Web service. Alternatively, it may refer to a computer program that turns a computer into a server, e.g. Windows service. Originally used as "servers serve users" (and "users use servers"), in the sense of "obey", today one often says that "servers serve data", in the same sense as "give". For instance, web servers "serve web pages to users" or "service their requests".\r\nThe server is part of the client–server model; in this model, a server serves data for clients. The nature of communication between a client and server is request and response. This is in contrast with peer-to-peer model in which the relationship is on-demand reciprocation. In principle, any computerized process that can be used or called by another process (particularly remotely, particularly to share a resource) is a server, and the calling process or processes is a client. Thus any general purpose computer connected to a network can host servers. For example, if files on a device are shared by some process, that process is a file server. Similarly, web server software can run on any capable computer, and so a laptop or a personal computer can host a web server.\r\nWhile request–response is the most common client–server design, there are others, such as the publish–subscribe pattern. In the publish–subscribe pattern, clients register with a pub–sub server, subscribing to specified types of messages; this initial registration may be done by request–response. Thereafter, the pub–sub server forwards matching messages to the clients without any further requests: the server pushes messages to the client, rather than the client pulling messages from the server as in request–response.","materialsDescription":" <span style=\"font-weight: bold;\">What is a server?</span>\r\nA server is a software or hardware device that accepts and responds to requests made over a network. The device that makes the request, and receives a response from the server, is called a client. On the Internet, the term "server" commonly refers to the computer system which receives a request for a web document and sends the requested information to the client.\r\n<span style=\"font-weight: bold;\">What are they used for?</span>\r\nServers are used to manage network resources. For example, a user may set up a server to control access to a network, send/receive an e-mail, manage print jobs, or host a website. They are also proficient at performing intense calculations. Some servers are committed to a specific task, often referred to as dedicated. However, many servers today are shared servers which can take on the responsibility of e-mail, DNS, FTP, and even multiple websites in the case of a web server.\r\n<span style=\"font-weight: bold;\">Why are servers always on?</span>\r\nBecause they are commonly used to deliver services that are constantly required, most servers are never turned off. Consequently, when servers fail, they can cause the network users and company many problems. To alleviate these issues, servers are commonly set up to be fault-tolerant.\r\n<span style=\"font-weight: bold;\">What are the examples of servers?</span>\r\nThe following list contains links to various server types:\r\n<ul><li>Application server;</li><li>Blade server;</li><li>Cloud server;</li><li>Database server;</li><li>Dedicated server;</li><li>Domain name service;</li><li>File server;</li><li>Mail server;</li><li>Print server;</li><li>Proxy server;</li><li>Standalone server;</li><li>Web server.</li></ul>\r\n<span style=\"font-weight: bold;\">How do other computers connect to a server?</span>\r\nWith a local network, the server connects to a router or switch that all other computers on the network use. Once connected to the network, other computers can access that server and its features. For example, with a web server, a user could connect to the server to view a website, search, and communicate with other users on the network.\r\nAn Internet server works the same way as a local network server, but on a much larger scale. The server is assigned an IP address by InterNIC, or by a web host.\r\nUsually, users connect to a server using its domain name, which is registered with a domain name registrar. When users connect to the domain name (such as "computerhope.com"), the name is automatically translated to the server's IP address by a DNS resolver.\r\nThe domain name makes it easier for users to connect to the server because the name is easier to remember than an IP address. Also, domain names enable the server operator to change the IP address of the server without disrupting the way that users access the server. The domain name can always remain the same, even if the IP address changes.\r\n<span style=\"font-weight: bold;\">Where are servers stored?</span>\r\nIn a business or corporate environment, a server and other network equipment are often stored in a closet or glasshouse. These areas help isolate sensitive computers and equipment from people who should not have access to them.\r\nServers that are remote or not hosted on-site are located in a data center. With these types of servers, the hardware is managed by another company and configured remotely by you or your company.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":6754,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/bentley_systems.png","logo":true,"scheme":false,"title":"ContextCapture","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"contextcapture","companyTitle":"Bentley Systems","companyTypes":["vendor"],"companyId":2776,"companyAlias":"bentley-systems","description":"<h3>Reality Modeling Software</h3>\r\nWith ContextCapture, you can quickly produce even the most challenging 3D models of existing conditions for infrastructure projects of all types, derived from simple photographs and/or point clouds. Without the need for expensive, specialized equipment, you can quickly create and use these highly detailed, 3D reality meshes to provide precise real-world context for design, construction, and operations decisions for use throughout the lifecycle of a project. \r\nHybrid processing in ContextCapture enables the creation of engineering-ready reality meshes that incorporate the best of both worlds – the versatility and convenience of high-resolution photography supplemented, where needed, by additional accuracy of point clouds from laser scanning.\r\nDevelop precise reality meshes affordably with less investment of time and resources in specialized acquisition devices and associated training. You can easily produce 3D models using up to 300 gigapixels of photos taken with an ordinary camera and/or 3 billion points from a laser scanner, resulting in fine details, sharp edges, and geometric accuracy. Dramatically reduce processing time with the ability to run two ContextCapture instances in parallel on a single project.<br /><br />Extend your capabilities to extract value from reality modeling data with ContextCapture Editor, a 3D CAD module for editing and analyzing reality data, included with ContextCapture. ContextCapture Editor enables fast and easy manipulation of meshes of any scale as well as the generation of cross sections, extraction of ground and breaklines, and production of orthophotos, 3D PDFs, and iModels. You can integrate your meshes with GIS and engineering data to enable the intuitive search, navigation, visualization, and animation of that information within the visual context of the mesh to quickly and efficiently support the design process. <br /><br />To explore the ContextCapture model on a desktop computer, click the middle mouse button to rotate, the right button to pan, and the scroll wheel or the left button to zoom. On a touch device, simply pinch and twist too rotate and pinch to zoom. Additional commands for measuring and display styles are available from the menu at the top right corner of the window.","shortDescription":"Create 3D models from simple photographs and/or point clouds ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ContextCapture","keywords":"","description":"<h3>Reality Modeling Software</h3>\r\nWith ContextCapture, you can quickly produce even the most challenging 3D models of existing conditions for infrastructure projects of all types, derived from simple photographs and/or point clouds. Without the need for expe","og:title":"ContextCapture","og:description":"<h3>Reality Modeling Software</h3>\r\nWith ContextCapture, you can quickly produce even the most challenging 3D models of existing conditions for infrastructure projects of all types, derived from simple photographs and/or point clouds. Without the need for expe","og:image":"https://old.roi4cio.com/fileadmin/user_upload/bentley_systems.png"},"eventUrl":"","translationId":6754,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":780,"title":"CAD for architecture and construction - Computer-Aided Design","alias":"cad-for-architecture-and-construction-computer-aided-design","description":"Computer-aided design (CAD) is the use of computers (or workstations) to aid in the creation, modification, analysis or optimization of a design. CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation and to create a database for manufacturing. CAD output is often in the form of electronic files for print, machining or other manufacturing operations. The term CADD (for Computer Aided Design and Drafting) is also used.\r\nCAD may be used to design curves and figures in two-dimensional (2D) space or curves, surfaces and solids in three-dimensional (3D) space.\r\nCAD is an important industrial art extensively used in many applications, including architectural design, prosthetics and many more.\r\nSoftware for architecture - systems designed specifically for architects, whose tools allow you to build drawings and models from familiar objects (walls, columns, floors, etc.), to design buildings and facilities for industrial and civil construction. These programs have the tools to build three-dimensional models and obtain all the necessary working documentation and support modern technology of information modeling of buildings.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What is a CAD drafter or CAD Designer?</span></h1>\r\nEverything around us that is manufactured begins with an idea in a written plan. When these plans require illustrations or drawings to convey meaning, a CAD drafter is needed to prepare these ideas in graphic forms of communication. Drafters translate ideas and rough sketches of other professionals, such as architects and engineers, into scaled detail (or working) drawings. A CAD designer often prepares the plans and rough sketches for an architect or engineer. The designer has more education and thus more responsibility than the drafter but less than an architect or engineer.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What software do architects use?</span></h1>\r\n<p class=\"align-left\">Before computer-aided design software, architects relied solely on hand drawings and handmade architecture models to communicate their designs. With the evolution of technology and the architecture industry, architectural drafting software has changed the way architects plan and design buildings. Implementing 2D and 3D architecture software allows designers to draft at greater speed, test ideas and determine consistent project workflows. Advancements in rendering software provide architects and their clients with the ability to visually experience designs before a project is realized.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Is CAD 2D or 3D?</span></h1>\r\n<p class=\"align-left\">A common misconception surrounding CAD is that it is a 3D architecture software modeling tool only. However, CAD can be used as a 2D drawing tool as well. Construction designers might use a CAD tool that only works in 2D while architects might work in a 3D software architecture tools that has a 2D converter. It is highly dependent upon the actual platform used. This can be convenient because a company might only use a 2D tool and can pay for that tool alone. However, as construction centers around 3D modeling software for architecture and informational models, it will be harder for companies who only to use a 2D tool.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is CAD used for in construction?</span></h1>\r\n<p class=\"align-left\">There are a lot of uses for CAD in construction. Subcontractor’s designers can take the drawings made by the architect and add in additional necessary details to ensure constructability. From there they have a plan that they can work off of and check their work against. Companies have already done this to a degree of success. Some companies were able to use a combination of drones and 3D models to notice issues with the construction. Specifically, a company can overlay their live drone footage with the model. They could note that the foundation would be off and make corrections.</p>\r\n<p class=\"align-left\">Architecture planning software benefits contractors because the drawings and plans can be easily stored in the cloud. This allows for contractors to use their plans at any location. Also, if they are included in a shared file for the project, they can easily see changes to the plans. So, a subcontractor could quickly determine which changes were made, by who, and how it will impact construction.</p>\r\n<p class=\"align-left\">Another benefit of professional architecture software is it is more accurate than manual drawings. It’s easier for construction design software than it is when it’s manual. And it’s easier for subcontractors to add details than it is in manual drawings.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What architects’ tools have been transformed by technology?</span></h1>\r\nWorking methods that previously resulted in only the documentation of an idea are now moving toward the realization of a full virtual copy of a building and all its complex components before a single nail is hammered. As such, architects’ tools that used to be physical, like pens and pencils, are now mere basics in a virtual toolbox with capabilities an analog architect couldn’t even fathom. The breakneck pace of this change is good reason to reflect on the history of these architect software virtual tools by comparing them to their physical forebears.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Arm vs. Dynamic Input. </span>Appearing like an alien appendage affixed to a drawing board, a drafting arm originally consolidated a variety of tasks completed with separate rulers, straightedges and protractors into a single versatile tool. AutoCAD’s crosshair reticle, for example, once relied on manual input with compass-style designations before it featured point-and-click functionality with real-time metrics following it around the screen.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Tape Measure vs. Surveying App.</span> Documenting an existing building in order to plan its transformation is likely one of the most frequent tasks architects complete. Until recently, the only way to correctly do this was by hand, with a tape measure, pen and paper. Since the advent of infrared scanners, depth-sensing cameras and software that can communicate with them, the time-intensive process of surveying an existing space has been cut to a fraction of what it once was.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Template vs. Premade 3-D Models.</span> In the days of hand-drafting, adding furniture to a drawing meant choosing an appropriately scaled object from a stencil and tracing it. Today’s sophisticated equivalent that architecture software programs offer allows an infinite number of premade models to be brought into a wide range of design software with a single click. Despite technological advances in this practice, the old method may actually be advantageous due to its reliance on abstraction because choosing realistically detailed furnishings for an early design scheme often prompts cosmetic decisions long before they need to be made.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Electric Eraser vs. Undo.</span> The most simple, and, for this reason, the most underappreciated, transformation an architect’s tools have undergone between physical and virtual methods is the ease with which one can now reverse the work they’ve done. Allowing what essentially amounts to time travel, the Undo function is universal to almost all software programs and as such is often taken for granted. Prior to this wonderful invention, the savviest architects wielded handheld electric erasers allowing them to salvage large drawing sets in the event of a drafting mistake or last-minute design change.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Blueprint Machine vs. Inkjet Plotter. </span>If you hang around an architecture firm long enough, you might hear older designers talk about using a blueprint machine. Originally the premier method for producing copies of drawings, blueprint machines involved rolling an original drawing through a chemical mixture that reproduced the image on a special type of paper. For some time now, digital plotters have removed manual labor from the equation, being fed information directly from a virtual drawing file.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Digitizer Tablet vs. Touchscreen Workstation.</span> Early iterations of digital drafting were often paired with a digitizer: a special keyboard that could choose commands or be directly drawn on. Software used in architecture eventually got better at incorporating a keyboard and mouse, but nowadays the tide might be turning back to a hands-on approach as devices like Microsoft’s Surface Studio are pushing an interface with touch-heavy tools just for architects. Though currently limited to apps for sketching and drawing review, the way architects work could be changed forever if a large influential company like Autodesk or Graphisoft were to fully embrace touchscreen capabilities.</li></ul>\r\n\r\n<p class=\"align-left\"><br /><br /> <br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CAD.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4982,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Oracle_Flexcube.png","logo":true,"scheme":false,"title":"Oracle FLEXCUBE","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":150,"alias":"oracle-flexcube","companyTitle":"Oracle","companyTypes":["supplier","vendor"],"companyId":164,"companyAlias":"oracle","description":"The financial services industry continues to evolve amidst disruption caused by an unprecedented proliferation of digital technologies and connectivity. This disruption coupled with several regulatory directives is also driving the emergence of connected ecosystems. To successfully address disruption, protect their customer relationships and business, effectively comply with regulations, stay competitive and leverage the ecosystem opportunity, banks must double down on transforming their systems so that they can leverage digital technologies and connectivity to deliver better services, experiences and value for their customers.\r\nWith technology at the core of banking, modernization of core systems is the cornerstone of digital transformation in a bank. Oracle FLEXCUBE Universal Banking can help banks jumpstart digital transformation and leapfrog their capabilities to stay relevant, competitive and compliant in a fast evolving industry. With its modern, digital, shrink-wrapped, pre-configured, interoperable, scalable and connected capabilities, Oracle FLEXCUBE Universal Banking can help catapult banks to the fore front of digital innovation and leadership.<br />\r\n<span style=\"font-weight: bold;\">ACCELERATED DIGITAL TRANSFORMATION</span><br />\r\nBanks can transform the way they understand customers, develop new products and services, focus on new business lines, initiatives and deliver engaging experiences across multiple digital channels.<br />\r\n<span style=\"font-weight: bold;\">Oracle FLEXCUBE offers:</span>\r\n<ul><li>Multi-channel, multi-device and multi-vendor access coupled with best-in-class functionality that helps banks offer innovative services and frictionless experiences.</li></ul>\r\n<ul><li>Multi-dimensional views of customer data to enable a deeper understanding of customers as individuals and helps banks offer personalized services and experiences that are highly contextual and relevant.</li></ul>\r\n<ul><li>Mobility, service ubiquity and experience that drives stakeholder convenience.</li></ul>\r\n<span style=\"font-weight: bold;\">Key Business Benefits:</span>\r\n<ul><li>Offers business mobility, service experience, ubiquity and customer centricity</li></ul>\r\n<ul><li>Drives growth through customer centricity</li></ul>\r\n<ul><li>Enables an accelerated time-tomarket</li></ul>\r\n<ul><li>Enables customized transformation using best of breed point or pre-integrated solutions</li></ul>\r\n<ul><li>Has a connected architecture that enables collaboration</li></ul>\r\n<ul><li>Enables Open Banking and API monetization</li></ul>\r\n<ul><li>Offers operational and cost efficiencies from automated decisioning</li></ul>","shortDescription":"Решение Oracle FLEXCUBE предназначено для финансовых учреждений и предлагает клиентоориентированные основные банковские функции, функции интернет-обслуживания и управления частным капиталом. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Oracle FLEXCUBE","keywords":"","description":"The financial services industry continues to evolve amidst disruption caused by an unprecedented proliferation of digital technologies and connectivity. This disruption coupled with several regulatory directives is also driving the emergence of connected ecosy","og:title":"Oracle FLEXCUBE","og:description":"The financial services industry continues to evolve amidst disruption caused by an unprecedented proliferation of digital technologies and connectivity. This disruption coupled with several regulatory directives is also driving the emergence of connected ecosy","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Oracle_Flexcube.png"},"eventUrl":"","translationId":4983,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":158,"title":"Core Banking System","alias":"core-banking-system","description":"Core (centralized online real-time exchange) banking is a banking service provided by a group of networked bank branches where customers may access their bank account and perform basic transactions from any of the member branch offices.\r\nCore banking system is often associated with retail banking and many banks treat the retail customers as their core banking customers. Businesses are usually managed via the corporate banking division of the institution. Core banking covers basic depositing and lending of money.\r\nCore banking functions will include transaction accounts, loans, mortgages and payments. Banks make these services available across multiple channels like automated teller machines, Internet banking, mobile banking and branches.\r\nBanking software and network technology allow a bank to centralise its record keeping and allow access from any location.\r\nAdvancements in Internet and information technology reduced manual work in banks and increasing efficiency. Computer software is developed to perform core operations of banking like recording of transactions, passbook maintenance, interest calculations on loans and deposits, customer records, balance of payments and withdrawal. This software is installed at different branches of bank and then interconnected by means of computer networks based on telephones, satellite and the Internet.\r\nGartner defines a core banking system as a back-end system that processes daily banking transactions, and posts updates to accounts and other financial records. Core banking solutions typically include deposit, loan and credit-processing capabilities, with interfaces to general ledger systems and reporting tools. Core banking applications are often one of the largest single expense for banks and legacy software are a major issue in terms of allocating resources. Spending on these systems is based on a combination of service-oriented architecture and supporting technologies.\r\nMany banks implement custom applications for core banking. Others implement or customize commercial independent software vendor packages. Systems integrators like Cognizant, EdgeVerve Systems Limited, Capgemini, Accenture, IBM and Tata Consultancy Services implement these core banking packages at banks. More recently, entrants such as Probanx (since 2000) and Temenos (late 1990's) have also provided entry level core banking software, focussing on neo-banks and electronic money institutions.\r\nOpen source Technology in core banking products or software can help banks to maintain their productivity and profitability at the same time. ","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is core banking solution (CBS)?</span></h1>\r\nToday Banking as a business has grown tremendously and transformed itself from only a deposits taking and loan providing system to an institution which provides an entire gamut of products and services under a wide umbrella. All such activities commenced by a bank is called Core Banking.\r\nCORE is an acronym for "Centralized Online Real-time Exchange", thus the bank’s branches can access applications from centralized data centers.\r\nOther than retail banking customers, core banking is now also being extended to address the requirements of corporate clients and provide for a comprehensive banking solution.<br />Digital core banking offer the following advantages to the bank:\r\n<ul><li>Improved operations which address customer demands and industry consolidation;</li><li>Errors due to multiple entries eradicated;</li><li>Easy ability to introduce new financial products and manage changes in existing products;</li><li>Seamless merging of back office data and self-service operations.</li></ul>\r\n<span style=\"font-weight: bold;\">Minimum features of Core Banking Solution:</span>\r\n<ol><li>Customer-On Boarding.</li><li>Managing deposits and withdrawals.</li><li>Transactions management.</li><li>Calculation and management.</li><li>Payments processing (cash, cheques /checks, mandates, NEFT, RTGS etc.).</li><li>Customer relationship management (CRM) activities.</li><li>Designing new banking products.</li><li>Loans disbursal and management.</li><li>Accounts management</li><li>Establishing criteria for minimum balances, interest rates, number of withdrawals allowed and so on.</li></ol>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Choosing the best core banking system software</span></h1>\r\n<p class=\"align-left\">Today, there are four primary core banking providers, FIS, Fiserv, Jack Henry and D+H, that have managed to eat up 96 percent of the market share (90 percent for banks under $1 billion in assets and 98 percent for banks over $1 billion in assets). But there are also some strong players rounding out the remaining 4 percent.<br />Deciding on a core banking software solutions is the first key task for banks and credit unions looking to make the switch. But the decision is not one to be taken lightly, as pointed out by Forbes “Core technologies are evolving into highly agile architectures, and the implications for making the wrong decision will be lasting — and could put banks at competitive risk.”</p>\r\n<p class=\"align-left\">To help your bank and credit union make the best use of your resources, Gartner identified the eight key criteria that have the most impact on CBS banking system decisions:<br /><br /></p>\r\n<ul><li> Functionality</li><li> Flexibility</li><li> Cost</li><li> Viability</li><li> Operational Performance</li><li> Program Management</li><li> Partner Management</li><li> Customer References</li></ul>\r\n<p class=\"align-left\"><br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Core_Banking_System1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3449,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg","logo":true,"scheme":false,"title":"McAfee Complete Data Protection","vendorVerified":1,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":110,"alias":"mcafee-complete-data-protection","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<span style=\"color: rgb(97, 97, 97); \">Secure your confidential data with an enterprise-grade security solution that is FIPS 140-2 and Common Criteria EAL2+ certified, and accelerated with the Intel® Advanced Encryption Standard—New Instructions (Intel AES-NI) set. McAfee Complete Data Protection uses drive encryption combined with strong access control via two-factor pre-boot authentication to prevent unauthorized access to confidential data on endpoints, including desktops, virtual desktop infrastructure (VDI) workstations, laptops, Microsoft Windows tablets, USB drives, and more.<br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\">Key Features</span><br />■ Drive encryption<br />■ File and removable media protection<br />■ Management of native encryption<br /><br /><span style=\"font-weight: bold;\">Key Advantages</span><br />■ Stop data loss initiated by sophisticated malware that hijacks sensitive and personal information.<br />■ Secure data when it’s stored on desktops, laptops, tablets, and cloud storage.<br />■ Manage Apple FileVault and Microsoft BitLocker native encryption on endpoints directly from McAfee ePO software.<br />■ Communicate with and take control of your endpoints at the hardware level, whether they are powered off, disabled, or encrypted to halt desk-side visits and endless helpdesk calls due to security incidents, outbreaks, or forgotten encryption passwords.<br />■ Prove compliance with advanced reporting and auditing capabilities and monitor events and generate detailed reports that show auditors and other stakeholders your compliance with internal and regulatory privacy requirements.<br /></span>","shortDescription":"McAfee Complete Data Protection is a comprehensive endpoint encryption solution","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Complete Data Protection","keywords":"","description":"<span style=\"color: rgb(97, 97, 97); \">Secure your confidential data with an enterprise-grade security solution that is FIPS 140-2 and Common Criteria EAL2+ certified, and accelerated with the Intel® Advanced Encryption Standard—New Instructions (Intel AES-NI)","og:title":"McAfee Complete Data Protection","og:description":"<span style=\"color: rgb(97, 97, 97); \">Secure your confidential data with an enterprise-grade security solution that is FIPS 140-2 and Common Criteria EAL2+ certified, and accelerated with the Intel® Advanced Encryption Standard—New Instructions (Intel AES-NI)","og:image":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg"},"eventUrl":"","translationId":3450,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":43,"title":"Data Encryption","alias":"data-encryption","description":"<span style=\"font-weight: bold;\">Data encryption</span> translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext. Currently, encryption is one of the most popular and effective data security methods used by organizations. \r\nTwo main types of data encryption exist - <span style=\"font-weight: bold;\">asymmetric encryption</span>, also known as public-key encryption, and <span style=\"font-weight: bold;\">symmetric encryption</span>.<br />The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. The outdated data encryption standard (DES) has been replaced by modern encryption algorithms that play a critical role in the security of IT systems and communications.\r\nThese algorithms provide confidentiality and drive key security initiatives including authentication, integrity, and non-repudiation. Authentication allows for the verification of a message’s origin, and integrity provides proof that a message’s contents have not changed since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny sending the message.\r\nData protection software for data encryption can provide encryption of devices, email, and data itself. In many cases, these encryption functionalities are also met with control capabilities for devices, email, and data. \r\nCompanies and organizations face the challenge of protecting data and preventing data loss as employees use external devices, removable media, and web applications more often as a part of their daily business procedures. Sensitive data may no longer be under the company’s control and protection as employees copy data to removable devices or upload it to the cloud. As a result, the best data loss prevention solutions prevent data theft and the introduction of malware from removable and external devices as well as web and cloud applications. In order to do so, they must also ensure that devices and applications are used properly and that data is secured by auto-encryption even after it leaves the organization.\r\nEncryption software program encrypts data or files by working with one or more encryption algorithms. Security personnel use it to protect data from being viewed by unauthorized users.\r\nTypically, each data packet or file encrypted via data encryption programs requires a key to be decrypted to its original form. This key is generated by the software itself and shared between the data/file sender and receiver. Thus, even if the encrypted data is extracted or compromised, its original content cannot be retrieved without the encryption key. File encryption, email encryption, disk encryption and network encryption are widely used types of data encryption software.<br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is Encryption software?</span></h1>\r\nEncryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet.There are many software products which provide encryption. Software encryption uses a cipher to obscure the content into ciphertext. One way to classify this type of software is by the type of cipher used. Ciphers can be divided into two categories: <span style=\"font-weight: bold;\">public key ciphers</span> (also known as asymmetric ciphers), and <span style=\"font-weight: bold;\">symmetric key ciphers</span>. Encryption software can be based on either public key or symmetric key encryption.\r\nAnother way to classify crypto software is to categorize its purpose. Using this approach, software encryption may be classified into software which encrypts "<span style=\"font-weight: bold;\">data in transit</span>" and software which encrypts "<span style=\"font-weight: bold;\">data at rest</span>". Data in transit generally uses public key ciphers, and data at rest generally uses symmetric key ciphers.\r\nSymmetric key ciphers can be further divided into stream ciphers and block ciphers. Stream ciphers typically encrypt plaintext a bit or byte at a time, and are most commonly used to encrypt real-time communications, such as audio and video information. The key is used to establish the initial state of a keystream generator, and the output of that generator is used to encrypt the plaintext. Block cipher algorithms split the plaintext into fixed-size blocks and encrypt one block at a time. For example, AES processes 16-byte blocks, while its predecessor DES encrypted blocks of eight bytes.<br />There is also a well-known case where PKI is used for data in transit of data at rest.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">How Data Encryption is used?</span></h1>\r\nThe purpose of data encryption is to deter malicious or negligent parties from accessing sensitive data. An important line of defense in a cybersecurity architecture, encryption makes using intercepted data as difficult as possible. It can be applied to all kinds of data protection needs ranging from classified government intel to personal credit card transactions. Data encryption software, also known as an encryption algorithm or cipher, is used to develop an encryption scheme which theoretically can only be broken with large amounts of computing power.\r\nEncryption is an incredibly important tool for keeping your data safe. When your files are encrypted, they are completely unreadable without the correct encryption key. If someone steals your encrypted files, they won’t be able to do anything with them.\r\nThere different types of encryption: hardware and software. Both offer different advantages. So, what are these methods and why do they matter?\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Software Encryption</span></h1>\r\n<p class=\"align-left\">As the name implies, software encryption uses features of encryption software to encrypt your data. Cryptosoft typically relies on a password; give the right password, and your files will be decrypted, otherwise they remain locked. With encryption enabled, it is passed through a special algorithm that scrambles your data as it is written to disk. The same software then unscrambles data as it is read from the disk for an authenticated user.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Pros.</span>Crypto programs is typically quite cheap to implement, making it very popular with developers. In addition, software-based encryption routines do not require any additional hardware.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Cons.</span>Types of encryption software is only as secure as the rest of your computer or smartphone. If a hacker can crack your password, the encryption is immediately undone.<br />Software encryption tools also share the processing resources of your computer, which can cause the entire machine to slow down as data is encrypted/decrypted. You will also find that opening and closing encrypted files is much slower than normal because the process is relatively resource intensive, particularly for higher levels of encryption</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Hardware encryption</span></h1>\r\n<p class=\"align-left\">At the heart of hardware encryption is a separate processor dedicated to the task of authentication and encryption. Hardware encryption is increasingly common on mobile devices. <br />The encryption protection technology still relies on a special key to encrypt and decrypt data, but this is randomly generated by the encryption processor. Often times, hardware encryption devices replace traditional passwords with biometric logons (like fingerprints) or a PIN number that is entered on an attached keypad<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Pros.</span>Hardware offers strong encryption, safer than software solutions because the encryption process is separate from the rest of the machine. This makes it much harder to intercept or break. </p>\r\n<p class=\"align-left\">The use of a dedicated processor also relieves the burden on the rest of your device, making the encryption and decryption process much faster.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Cons.</span>Typically, hardware-based encrypted storage is much more expensive than a software encryption tools. <br />If the hardware decryption processor fails, it becomes extremely hard to access your information.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">The Data Recovery Challenge. </span>Encrypted data is a challenge to recover. Even by recovering the raw sectors from a failed drive, it is still encrypted, which means it is still unreadable. </p>\r\n<p class=\"align-left\">Hardware encrypted devices don’t typically have these additional recovery options. Many have a design to prevent decryption in the event of a component failure, stopping hackers from disassembling them. The fastest and most effective way to deal with data loss on an encrypted device is to ensure you have a complete backup stored somewhere safe. For your PC, this may mean copying data to another encrypted device. For other devices, like your smartphone, backing up to the Cloud provides a quick and simple economy copy that you can restore from. As an added bonus, most Cloud services now encrypt their users’ data too. <br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Data_Encryption.png"},{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":" MDR, which stands for Managed Detection & Response, is an all-encompassing threat detection system, which arose from the need for small/medium-sized organizations who lack resources to be able to monitor their network systems in-house. It provides a cost-effective alternative to SIEM (Security Information and Event Management).\r\nEveryday, the capabilities of attackers get more sophisticated and the volume of alerts becomes overwhelming and unmanageable. In-house teams might struggle to analyze and log data, which makes it harder than ever to determine if these threats are harmful. MDR can put a stop to attacks before they even happen. MDR technology monitors your systems and detects any unusual behavior, whilst our expert team responds to the threats detected within your business.\r\nMDR offers real-time threat intelligence, and is able to analyse behaviour which can be missed by traditional endpoint security technology. MDR also provides rapid identification of known threats, which in turn minimises overall attacks. Having remote incident investigation will minimise damage to your business, and will allow you to get back to work in no time. It’s important to note that using MDR services will allow third party access to your company's data. You need to consider working with a provider who understands and respects your data policy.","materialsDescription":" <span style=\"font-weight: bold;\">What is Managed Detection and Response?</span>\r\nManaged Detection and Response (MDR) is a managed cybersecurity service that provides intrusion detection of malware and malicious activity in your network, and assists in rapid incident response to eliminate those threats with succinct remediation actions. MDR typically combines a technology solution with outsourced security analysts that extend your technologies and team.\r\n<span style=\"font-weight: bold;\">Isn’t that What MSSPs or Managed SIEMs Do?</span>\r\nNo. Managed Security Service Providers (MSSPs) monitor network security controls and may send alerts when anomalies are identified. MSSPs typically do not investigate the anomalies to eliminate false positives, nor do they respond to real threats. This means that abnormalities in network usage are forwarded to your IT personnel who must then dig through the data to determine if there is a real threat and what to do about it.\r\n<span style=\"font-weight: bold;\">Doesn’t My Firewall Protect My Network?</span>\r\nFirewalls and other preventive forms of cybersecurity are very important and effective at preventing basic cyberattacks. However, over the past decade, it has become clear that preventive cybersecurity technologies are not enough to secure an organization’s network. Further, they are yet another source of alerts, log messages, and events that contribute to the “alert fatigue” being universally suffered today. Recent major hacks such as the Marriot Hack of 2018, the Anthem Hack of 2015, and the Target Hack of 2013 demonstrate how easily cybercriminals can breach networks at enterprise organizations to steal millions of credit card numbers, medical records, and other forms of PII/PHI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Endpoint_Detection_and_Response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":6780,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/bentley_systems.png","logo":true,"scheme":false,"title":"RAM","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"programmnoe-obespechenie-ram","companyTitle":"Bentley Systems","companyTypes":["vendor"],"companyId":2776,"companyAlias":"bentley-systems","description":"Easily produce high quality and economical designs for all your structural projects using various concrete, steel, and joist building materials. Design, analyze, and create documentation with ease for your building projects, saving time and money. Maximize your software investment with one fully integrated application suite offering complete building analysis, design, and drafting for both steel and concrete structures. Increase your productivity by eliminating tedious and time consuming tasks with RAM’s practical applications. Design anything from individual components to large-scale buildings and foundations.\r\nBrand RAM includes such products:\r\n<ul><li><span style=\"font-weight: bold;\">Structural WorkSuite.</span> Use what you want, when you want it, with our most comprehensive suite of trusted structural analysis and design applications like STAAD and RAM.</li><li><span style=\"font-weight: bold;\">RAM Structural System.</span> Tackle projects with confidence and quickly produce high quality and economical designs, using various concrete, steel, and joist building materials.</li><li><span style=\"font-weight: bold;\">RAM Connection.</span> Analyze and design of any connection type and verify your connections in seconds, all with comprehensive calculations, including seismic compliance.</li><li><span style=\"font-weight: bold;\">RAM Elements. </span>Perform analysis and design – including 3D finite element analysis – of almost any type of structure or structural component, in one affordable application.</li><li><span style=\"font-weight: bold;\">RAM Concept.</span> Economically design concrete slabs, mats, and rafts with exceptional visibility into compliance, efficiency, and practicality.</li><li><span style=\"font-weight: bold;\">RAM SBeam Virtuoso Subscription.</span> A specialized desktop application for the design of steel beams and joists.</li></ul>\r\n\r\n","shortDescription":"Works like an engineer thinks: Structural Design Software for Buildings ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"RAM","keywords":"","description":"Easily produce high quality and economical designs for all your structural projects using various concrete, steel, and joist building materials. Design, analyze, and create documentation with ease for your building projects, saving time and money. Maximize you","og:title":"RAM","og:description":"Easily produce high quality and economical designs for all your structural projects using various concrete, steel, and joist building materials. Design, analyze, and create documentation with ease for your building projects, saving time and money. Maximize you","og:image":"https://old.roi4cio.com/fileadmin/user_upload/bentley_systems.png"},"eventUrl":"","translationId":6780,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":780,"title":"CAD for architecture and construction - Computer-Aided Design","alias":"cad-for-architecture-and-construction-computer-aided-design","description":"Computer-aided design (CAD) is the use of computers (or workstations) to aid in the creation, modification, analysis or optimization of a design. CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation and to create a database for manufacturing. CAD output is often in the form of electronic files for print, machining or other manufacturing operations. The term CADD (for Computer Aided Design and Drafting) is also used.\r\nCAD may be used to design curves and figures in two-dimensional (2D) space or curves, surfaces and solids in three-dimensional (3D) space.\r\nCAD is an important industrial art extensively used in many applications, including architectural design, prosthetics and many more.\r\nSoftware for architecture - systems designed specifically for architects, whose tools allow you to build drawings and models from familiar objects (walls, columns, floors, etc.), to design buildings and facilities for industrial and civil construction. These programs have the tools to build three-dimensional models and obtain all the necessary working documentation and support modern technology of information modeling of buildings.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What is a CAD drafter or CAD Designer?</span></h1>\r\nEverything around us that is manufactured begins with an idea in a written plan. When these plans require illustrations or drawings to convey meaning, a CAD drafter is needed to prepare these ideas in graphic forms of communication. Drafters translate ideas and rough sketches of other professionals, such as architects and engineers, into scaled detail (or working) drawings. A CAD designer often prepares the plans and rough sketches for an architect or engineer. The designer has more education and thus more responsibility than the drafter but less than an architect or engineer.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What software do architects use?</span></h1>\r\n<p class=\"align-left\">Before computer-aided design software, architects relied solely on hand drawings and handmade architecture models to communicate their designs. With the evolution of technology and the architecture industry, architectural drafting software has changed the way architects plan and design buildings. Implementing 2D and 3D architecture software allows designers to draft at greater speed, test ideas and determine consistent project workflows. Advancements in rendering software provide architects and their clients with the ability to visually experience designs before a project is realized.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Is CAD 2D or 3D?</span></h1>\r\n<p class=\"align-left\">A common misconception surrounding CAD is that it is a 3D architecture software modeling tool only. However, CAD can be used as a 2D drawing tool as well. Construction designers might use a CAD tool that only works in 2D while architects might work in a 3D software architecture tools that has a 2D converter. It is highly dependent upon the actual platform used. This can be convenient because a company might only use a 2D tool and can pay for that tool alone. However, as construction centers around 3D modeling software for architecture and informational models, it will be harder for companies who only to use a 2D tool.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is CAD used for in construction?</span></h1>\r\n<p class=\"align-left\">There are a lot of uses for CAD in construction. Subcontractor’s designers can take the drawings made by the architect and add in additional necessary details to ensure constructability. From there they have a plan that they can work off of and check their work against. Companies have already done this to a degree of success. Some companies were able to use a combination of drones and 3D models to notice issues with the construction. Specifically, a company can overlay their live drone footage with the model. They could note that the foundation would be off and make corrections.</p>\r\n<p class=\"align-left\">Architecture planning software benefits contractors because the drawings and plans can be easily stored in the cloud. This allows for contractors to use their plans at any location. Also, if they are included in a shared file for the project, they can easily see changes to the plans. So, a subcontractor could quickly determine which changes were made, by who, and how it will impact construction.</p>\r\n<p class=\"align-left\">Another benefit of professional architecture software is it is more accurate than manual drawings. It’s easier for construction design software than it is when it’s manual. And it’s easier for subcontractors to add details than it is in manual drawings.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What architects’ tools have been transformed by technology?</span></h1>\r\nWorking methods that previously resulted in only the documentation of an idea are now moving toward the realization of a full virtual copy of a building and all its complex components before a single nail is hammered. As such, architects’ tools that used to be physical, like pens and pencils, are now mere basics in a virtual toolbox with capabilities an analog architect couldn’t even fathom. The breakneck pace of this change is good reason to reflect on the history of these architect software virtual tools by comparing them to their physical forebears.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Arm vs. Dynamic Input. </span>Appearing like an alien appendage affixed to a drawing board, a drafting arm originally consolidated a variety of tasks completed with separate rulers, straightedges and protractors into a single versatile tool. AutoCAD’s crosshair reticle, for example, once relied on manual input with compass-style designations before it featured point-and-click functionality with real-time metrics following it around the screen.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Tape Measure vs. Surveying App.</span> Documenting an existing building in order to plan its transformation is likely one of the most frequent tasks architects complete. Until recently, the only way to correctly do this was by hand, with a tape measure, pen and paper. Since the advent of infrared scanners, depth-sensing cameras and software that can communicate with them, the time-intensive process of surveying an existing space has been cut to a fraction of what it once was.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Template vs. Premade 3-D Models.</span> In the days of hand-drafting, adding furniture to a drawing meant choosing an appropriately scaled object from a stencil and tracing it. Today’s sophisticated equivalent that architecture software programs offer allows an infinite number of premade models to be brought into a wide range of design software with a single click. Despite technological advances in this practice, the old method may actually be advantageous due to its reliance on abstraction because choosing realistically detailed furnishings for an early design scheme often prompts cosmetic decisions long before they need to be made.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Electric Eraser vs. Undo.</span> The most simple, and, for this reason, the most underappreciated, transformation an architect’s tools have undergone between physical and virtual methods is the ease with which one can now reverse the work they’ve done. Allowing what essentially amounts to time travel, the Undo function is universal to almost all software programs and as such is often taken for granted. Prior to this wonderful invention, the savviest architects wielded handheld electric erasers allowing them to salvage large drawing sets in the event of a drafting mistake or last-minute design change.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Blueprint Machine vs. Inkjet Plotter. </span>If you hang around an architecture firm long enough, you might hear older designers talk about using a blueprint machine. Originally the premier method for producing copies of drawings, blueprint machines involved rolling an original drawing through a chemical mixture that reproduced the image on a special type of paper. For some time now, digital plotters have removed manual labor from the equation, being fed information directly from a virtual drawing file.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Digitizer Tablet vs. Touchscreen Workstation.</span> Early iterations of digital drafting were often paired with a digitizer: a special keyboard that could choose commands or be directly drawn on. Software used in architecture eventually got better at incorporating a keyboard and mouse, but nowadays the tide might be turning back to a hands-on approach as devices like Microsoft’s Surface Studio are pushing an interface with touch-heavy tools just for architects. Though currently limited to apps for sketching and drawing review, the way architects work could be changed forever if a large influential company like Autodesk or Graphisoft were to fully embrace touchscreen capabilities.</li></ul>\r\n\r\n<p class=\"align-left\"><br /><br /> <br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CAD.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":6782,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/bentley_systems.png","logo":true,"scheme":false,"title":"RAM Concept","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"ram-concept","companyTitle":"Bentley Systems","companyTypes":["vendor"],"companyId":2776,"companyAlias":"bentley-systems","description":"<h3 class=\"align-center\">Concrete Slab Design Software</h3>\r\nEconomically design post-tensioned and reinforced concrete floors including slabs, mats, and rafts, with exceptional visibility into compliance, efficiency, and practicality. Design floors and foundations reliably and efficiently, saving time and money, and overcoming the most common concerns you face as a designer. RAM Concept allows you to easily design complex floor geometries and incorporate changes with ease using powerful task automation and clearly organized output. \r\n<h3 class=\"align-center\">Capabilities </h3>\r\n<ul><li><span style=\"font-weight: bold;\">Design post-tensioned and conventional concrete floors.</span> Design elevated concrete slabs with or without post-tensioning. Consider all major aspects of slab design, including service, ductility, and strength limit states, punching shear requirements, long-term deflections, and walking vibration.</li><li><span style=\"font-weight: bold;\">Design raft or mat foundations to international standards.</span> Design raft or mat foundations using soil springs and a zero-tension analysis. Confidently complete your designs with the extensive support of international standards.</li><li><span style=\"font-weight: bold;\">Analyze gravity, lateral, and temperature loads.</span> Design and analyze simple or complex concrete floors for a wide range of loading conditions, including skip live loads, wind/seismic loads, and temperature loads.</li><li><span style=\"font-weight: bold;\">Optimize post-tensioned concrete floor designs.</span> Optimize the design of post-tensioning, reinforcement, and studded shear reinforcement for post-tensioned concrete floors using a cloud-based optimization feature. Save hours of engineering time by eliminating the need for tedious manual iteration. Let the optimizer sort through thousands of design alternatives and have confidence that your post-tensioned design has reduced material and labor costs.</li><li><span style=\"font-weight: bold;\">Integrate with RAM Structural System.</span>Transfer floor or raft/mat foundation geometry and loading, including lateral load effects, from RAM Structural System. Export reactions, including post-tensioning effects, to RAM Structural System for column design.</li><li><span style=\"font-weight: bold;\">Analyze deflections for time-dependent effects.</span> Capture the time-varying properties of concrete in your analysis. Account for creep, shrinkage, and cracking at various time stages in the analysis, accurately predicting deflections with consideration for how concrete truly behaves.</li><li><span style=\"font-weight: bold;\">Analyze floors for walking vibration.</span> Study dynamic behavior, including resonant and impulsive effects, of simple and complex concrete floors due to walking vibration. Evaluate sensitivity criteria for occupants or sensitive equipment.</li></ul>","shortDescription":"Your go-to concrete slab and foundation design workhorse ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"RAM Concept","keywords":"","description":"<h3 class=\"align-center\">Concrete Slab Design Software</h3>\r\nEconomically design post-tensioned and reinforced concrete floors including slabs, mats, and rafts, with exceptional visibility into compliance, efficiency, and practicality. Design floors and founda","og:title":"RAM Concept","og:description":"<h3 class=\"align-center\">Concrete Slab Design Software</h3>\r\nEconomically design post-tensioned and reinforced concrete floors including slabs, mats, and rafts, with exceptional visibility into compliance, efficiency, and practicality. Design floors and founda","og:image":"https://old.roi4cio.com/fileadmin/user_upload/bentley_systems.png"},"eventUrl":"","translationId":6782,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":780,"title":"CAD for architecture and construction - Computer-Aided Design","alias":"cad-for-architecture-and-construction-computer-aided-design","description":"Computer-aided design (CAD) is the use of computers (or workstations) to aid in the creation, modification, analysis or optimization of a design. CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation and to create a database for manufacturing. CAD output is often in the form of electronic files for print, machining or other manufacturing operations. The term CADD (for Computer Aided Design and Drafting) is also used.\r\nCAD may be used to design curves and figures in two-dimensional (2D) space or curves, surfaces and solids in three-dimensional (3D) space.\r\nCAD is an important industrial art extensively used in many applications, including architectural design, prosthetics and many more.\r\nSoftware for architecture - systems designed specifically for architects, whose tools allow you to build drawings and models from familiar objects (walls, columns, floors, etc.), to design buildings and facilities for industrial and civil construction. These programs have the tools to build three-dimensional models and obtain all the necessary working documentation and support modern technology of information modeling of buildings.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What is a CAD drafter or CAD Designer?</span></h1>\r\nEverything around us that is manufactured begins with an idea in a written plan. When these plans require illustrations or drawings to convey meaning, a CAD drafter is needed to prepare these ideas in graphic forms of communication. Drafters translate ideas and rough sketches of other professionals, such as architects and engineers, into scaled detail (or working) drawings. A CAD designer often prepares the plans and rough sketches for an architect or engineer. The designer has more education and thus more responsibility than the drafter but less than an architect or engineer.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What software do architects use?</span></h1>\r\n<p class=\"align-left\">Before computer-aided design software, architects relied solely on hand drawings and handmade architecture models to communicate their designs. With the evolution of technology and the architecture industry, architectural drafting software has changed the way architects plan and design buildings. Implementing 2D and 3D architecture software allows designers to draft at greater speed, test ideas and determine consistent project workflows. Advancements in rendering software provide architects and their clients with the ability to visually experience designs before a project is realized.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Is CAD 2D or 3D?</span></h1>\r\n<p class=\"align-left\">A common misconception surrounding CAD is that it is a 3D architecture software modeling tool only. However, CAD can be used as a 2D drawing tool as well. Construction designers might use a CAD tool that only works in 2D while architects might work in a 3D software architecture tools that has a 2D converter. It is highly dependent upon the actual platform used. This can be convenient because a company might only use a 2D tool and can pay for that tool alone. However, as construction centers around 3D modeling software for architecture and informational models, it will be harder for companies who only to use a 2D tool.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is CAD used for in construction?</span></h1>\r\n<p class=\"align-left\">There are a lot of uses for CAD in construction. Subcontractor’s designers can take the drawings made by the architect and add in additional necessary details to ensure constructability. From there they have a plan that they can work off of and check their work against. Companies have already done this to a degree of success. Some companies were able to use a combination of drones and 3D models to notice issues with the construction. Specifically, a company can overlay their live drone footage with the model. They could note that the foundation would be off and make corrections.</p>\r\n<p class=\"align-left\">Architecture planning software benefits contractors because the drawings and plans can be easily stored in the cloud. This allows for contractors to use their plans at any location. Also, if they are included in a shared file for the project, they can easily see changes to the plans. So, a subcontractor could quickly determine which changes were made, by who, and how it will impact construction.</p>\r\n<p class=\"align-left\">Another benefit of professional architecture software is it is more accurate than manual drawings. It’s easier for construction design software than it is when it’s manual. And it’s easier for subcontractors to add details than it is in manual drawings.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What architects’ tools have been transformed by technology?</span></h1>\r\nWorking methods that previously resulted in only the documentation of an idea are now moving toward the realization of a full virtual copy of a building and all its complex components before a single nail is hammered. As such, architects’ tools that used to be physical, like pens and pencils, are now mere basics in a virtual toolbox with capabilities an analog architect couldn’t even fathom. The breakneck pace of this change is good reason to reflect on the history of these architect software virtual tools by comparing them to their physical forebears.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Arm vs. Dynamic Input. </span>Appearing like an alien appendage affixed to a drawing board, a drafting arm originally consolidated a variety of tasks completed with separate rulers, straightedges and protractors into a single versatile tool. AutoCAD’s crosshair reticle, for example, once relied on manual input with compass-style designations before it featured point-and-click functionality with real-time metrics following it around the screen.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Tape Measure vs. Surveying App.</span> Documenting an existing building in order to plan its transformation is likely one of the most frequent tasks architects complete. Until recently, the only way to correctly do this was by hand, with a tape measure, pen and paper. Since the advent of infrared scanners, depth-sensing cameras and software that can communicate with them, the time-intensive process of surveying an existing space has been cut to a fraction of what it once was.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Template vs. Premade 3-D Models.</span> In the days of hand-drafting, adding furniture to a drawing meant choosing an appropriately scaled object from a stencil and tracing it. Today’s sophisticated equivalent that architecture software programs offer allows an infinite number of premade models to be brought into a wide range of design software with a single click. Despite technological advances in this practice, the old method may actually be advantageous due to its reliance on abstraction because choosing realistically detailed furnishings for an early design scheme often prompts cosmetic decisions long before they need to be made.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Electric Eraser vs. Undo.</span> The most simple, and, for this reason, the most underappreciated, transformation an architect’s tools have undergone between physical and virtual methods is the ease with which one can now reverse the work they’ve done. Allowing what essentially amounts to time travel, the Undo function is universal to almost all software programs and as such is often taken for granted. Prior to this wonderful invention, the savviest architects wielded handheld electric erasers allowing them to salvage large drawing sets in the event of a drafting mistake or last-minute design change.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Blueprint Machine vs. Inkjet Plotter. </span>If you hang around an architecture firm long enough, you might hear older designers talk about using a blueprint machine. Originally the premier method for producing copies of drawings, blueprint machines involved rolling an original drawing through a chemical mixture that reproduced the image on a special type of paper. For some time now, digital plotters have removed manual labor from the equation, being fed information directly from a virtual drawing file.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Digitizer Tablet vs. Touchscreen Workstation.</span> Early iterations of digital drafting were often paired with a digitizer: a special keyboard that could choose commands or be directly drawn on. Software used in architecture eventually got better at incorporating a keyboard and mouse, but nowadays the tide might be turning back to a hands-on approach as devices like Microsoft’s Surface Studio are pushing an interface with touch-heavy tools just for architects. Though currently limited to apps for sketching and drawing review, the way architects work could be changed forever if a large influential company like Autodesk or Graphisoft were to fully embrace touchscreen capabilities.</li></ul>\r\n\r\n<p class=\"align-left\"><br /><br /> <br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CAD.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3456,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg","logo":true,"scheme":false,"title":"McAfee Network Security Platform","vendorVerified":1,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":110,"alias":"mcafee-network-security-platform","companyTitle":"McAfee","companyTypes":["vendor"],"companyId":184,"companyAlias":"mcafee","description":"<span style=\"color: rgb(97, 97, 97); \">McAfee® Network Security Platform (McAfee NSP) is a next-generation intrusion prevention system (IPS) that discovers and blocks sophisticated malware threats across the network.<br />It utilizes advanced detection and emulation techniques, moving beyond mere pattern matching to defend against stealthy attacks with a high degree of accuracy. To meet the needs of demanding networks, the platform can scale to more than 40 Gbps with a single device. The integrated McAfee solution portfolio streamlines security operations by combining real-time McAfee Global Threat Intelligence feeds with rich contextual data about users, devices, and applications for fast, accurate response to network-borne attacks.<br /><br /><span style=\"font-weight: bold;\">Key Advantages</span><br />■ Quickly detects and blocks threats to protect applications and data<br />■ High-performance, scalable solution for dynamic environments<br />■ Centralized management for visibility and control<br />■ Advanced detection, including signature-less malware analysis<br />■ Inbound and outbound SSL decryption to inspect network traffic<br />■ High-availability and disaster recovery protection<br />■ Virtual appliances also available<br />■ Integrates with McAfee solution portfolio for device-to-cloud security<br /></span><br />","shortDescription":"McAfee Network Security Platform is a next-generation intrusion prevention system (IPS) that redefines how organizations block advanced threats.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"McAfee Network Security Platform","keywords":"","description":"<span style=\"color: rgb(97, 97, 97); \">McAfee® Network Security Platform (McAfee NSP) is a next-generation intrusion prevention system (IPS) that discovers and blocks sophisticated malware threats across the network.<br />It utilizes advanced detection and emu","og:title":"McAfee Network Security Platform","og:description":"<span style=\"color: rgb(97, 97, 97); \">McAfee® Network Security Platform (McAfee NSP) is a next-generation intrusion prevention system (IPS) that discovers and blocks sophisticated malware threats across the network.<br />It utilizes advanced detection and emu","og:image":"https://old.roi4cio.com/fileadmin/user_upload/McAfee__logo_.jpg"},"eventUrl":"","translationId":3457,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Data protection and recovery software provide data backup, integrity and security for data backups and it enables timely, reliable and secure backup of data from a host device to destination device. Recently, Data Protection and Recovery Software market are disrupted by innovative technologies such as server virtualization, disk-based backup, and cloud services where emerging players are playing an important role. Tier one players such as IBM, Hewlett Packard Enterprise, EMC Corporation, Symantec Corporation and Microsoft Corporation are also moving towards these technologies through partnerships and acquisitions.\r\nThe major factor driving data protection and recovery software market is the high adoption of cloud-based services and technologies. Many organizations are moving towards the cloud to reduce their operational expenses and to provide real-time access to their employees. However, increased usage of the cloud has increased the risk of data loss and data theft and unauthorized access to confidential information, which increases the demand for data protection and recovery solution suites.","materialsDescription":" \r\n<span style=\"font-weight: bold; \">What is Data recovery?</span>\r\nData recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).\r\nThe most common data recovery scenario involves an operating system failure, malfunction of a storage device, logical failure of storage devices, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the ultimate goal is simply to copy all important files from the damaged media to another new drive. This can be easily accomplished using a Live CD or DVD by booting directly from a ROM instead of the corrupted drive in question. Many Live CDs or DVDs provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioning and consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files.\r\nAnother scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data is not easily read from the media devices. Depending on the situation, solutions involve repairing the logical file system, partition table or master boot record, or updating the firmware or drive recovery techniques ranging from software-based recovery of corrupted data, hardware- and software-based recovery of damaged service areas (also known as the hard disk drive's "firmware"), to hardware replacement on a physically damaged drive which allows for extraction of data to a new drive. If a drive recovery is necessary, the drive itself has typically failed permanently, and the focus is rather on a one-time recovery, salvaging whatever data can be read.\r\nIn a third scenario, files have been accidentally "deleted" from a storage medium by the users. Typically, the contents of deleted files are not removed immediately from the physical drive; instead, references to them in the directory structure are removed, and thereafter space the deleted data occupy is made available for later data overwriting. In the mind of end users, deleted files cannot be discoverable through a standard file manager, but the deleted data still technically exists on the physical drive. In the meantime, the original file contents remain, often in a number of disconnected fragments, and may be recoverable if not overwritten by other data files.\r\nThe term "data recovery" is also used in the context of forensic applications or espionage, where data which have been encrypted or hidden, rather than damaged, are recovered. Sometimes data present in the computer gets encrypted or hidden due to reasons like virus attack which can only be recovered by some computer forensic experts.\r\n<span style=\"font-weight: bold;\">What is a backup?</span>\r\nA backup, or data backup, or the process of backing up, refers to the copying into an archive file of computer data that is already in secondary storage—so that it may be used to restore the original after a data loss event. The verb form is "back up" (a phrasal verb), whereas the noun and adjective form is "backup".\r\nBackups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users; a 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups represent a simple form of disaster recovery and should be part of any disaster recovery plan, backups by themselves should not be considered a complete disaster recovery plan. One reason for this is that not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server by simply restoring data from a backup.\r\nSince a backup system contains at least one copy of all data considered worth saving, the data storage requirements can be significant. Organizing this storage space and managing the backup process can be a complicated undertaking. A data repository model may be used to provide structure to the storage. Nowadays, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.\r\nBefore data are sent to their storage locations, they are selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Every backup scheme should include dry runs that validate the reliability of the data being backed up. It is important to recognize the limitations and human factors involved in any backup scheme.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Protection_and_Recovery_Software__1_.png"},{"id":457,"title":"DDoS Protection","alias":"ddos-protection","description":" A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.\r\nIn a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source.\r\nA DoS or DDoS attack is analogous to a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter, disrupting trade.\r\nCriminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks or credit card payment gateways. Revenge, blackmail and activism can motivate these attacks. ","materialsDescription":" <span style=\"font-weight: bold;\">What are the Different Types of DDoS Attacks?</span>\r\nDistributed Denial of Service attacks vary significantly, and there are thousands of different ways an attack can be carried out (attack vectors), but an attack vector will generally fall into one of three broad categories:\r\n<span style=\"font-weight: bold;\">Volumetric Attacks:</span>\r\nVolumetric attacks attempt to consume the bandwidth either within the target network/service or between the target network/service and the rest of the Internet. These attacks are simply about causing congestion.\r\n<span style=\"font-weight: bold;\">TCP State-Exhaustion Attacks:</span>\r\nTCP State-Exhaustion attacks attempt to consume the connection state tables which are present in many infrastructure components such as load-balancers, firewalls and the application servers themselves. Even high capacity devices capable of maintaining state on millions of connections can be taken down by these attacks.\r\n<span style=\"font-weight: bold;\">Application Layer Attacks:</span>\r\nApplication Layer attacks target some aspect of an application or service at Layer-7. These are the deadliest kind of attacks as they can be very effective with as few as one attacking machine generating a low traffic rate (this makes these attacks very difficult to proactively detect and mitigate). Application layer attacks have come to prevalence over the past three or four years and simple application layer flood attacks (HTTP GET flood etc.) have been some of the most common denials of service attacks seen in the wild.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_DDoS_Protection.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":" MDR, which stands for Managed Detection & Response, is an all-encompassing threat detection system, which arose from the need for small/medium-sized organizations who lack resources to be able to monitor their network systems in-house. It provides a cost-effective alternative to SIEM (Security Information and Event Management).\r\nEveryday, the capabilities of attackers get more sophisticated and the volume of alerts becomes overwhelming and unmanageable. In-house teams might struggle to analyze and log data, which makes it harder than ever to determine if these threats are harmful. MDR can put a stop to attacks before they even happen. MDR technology monitors your systems and detects any unusual behavior, whilst our expert team responds to the threats detected within your business.\r\nMDR offers real-time threat intelligence, and is able to analyse behaviour which can be missed by traditional endpoint security technology. MDR also provides rapid identification of known threats, which in turn minimises overall attacks. Having remote incident investigation will minimise damage to your business, and will allow you to get back to work in no time. It’s important to note that using MDR services will allow third party access to your company's data. You need to consider working with a provider who understands and respects your data policy.","materialsDescription":" <span style=\"font-weight: bold;\">What is Managed Detection and Response?</span>\r\nManaged Detection and Response (MDR) is a managed cybersecurity service that provides intrusion detection of malware and malicious activity in your network, and assists in rapid incident response to eliminate those threats with succinct remediation actions. MDR typically combines a technology solution with outsourced security analysts that extend your technologies and team.\r\n<span style=\"font-weight: bold;\">Isn’t that What MSSPs or Managed SIEMs Do?</span>\r\nNo. Managed Security Service Providers (MSSPs) monitor network security controls and may send alerts when anomalies are identified. MSSPs typically do not investigate the anomalies to eliminate false positives, nor do they respond to real threats. This means that abnormalities in network usage are forwarded to your IT personnel who must then dig through the data to determine if there is a real threat and what to do about it.\r\n<span style=\"font-weight: bold;\">Doesn’t My Firewall Protect My Network?</span>\r\nFirewalls and other preventive forms of cybersecurity are very important and effective at preventing basic cyberattacks. However, over the past decade, it has become clear that preventive cybersecurity technologies are not enough to secure an organization’s network. Further, they are yet another source of alerts, log messages, and events that contribute to the “alert fatigue” being universally suffered today. Recent major hacks such as the Marriot Hack of 2018, the Anthem Hack of 2015, and the Target Hack of 2013 demonstrate how easily cybercriminals can breach networks at enterprise organizations to steal millions of credit card numbers, medical records, and other forms of PII/PHI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Endpoint_Detection_and_Response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":6017,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/adobe_logo.png","logo":true,"scheme":false,"title":"Adobe Photoshop","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":6,"alias":"adobe-photoshop","companyTitle":"Adobe","companyTypes":["vendor"],"companyId":181,"companyAlias":"adobe","description":"<span style=\"font-weight: bold; \">Creativity is everywhere. Now Photoshop is too.</span>\r\n<br /><span style=\"font-weight: bold; \">Powering the creative world.</span>\r\nThe world’s best imaging and graphic design software is at the core of just about every creative project, from photo editing and compositing to digital painting, animation, and graphic design. And now you can harness the power of Photoshop across desktop and iPad to create wherever inspiration strikes.\r\n<span style=\"font-weight: bold; \">Everyday photography. Totally transformed.</span>\r\nOur professional photography tools make it easy to do everyday edits or total image transformations across desktop and iPad. Crop, remove objects, retouch, and combine photos. Play with color and effects. And reimagine the art of photography.\r\n<span style=\"font-weight: bold; \">Design is in our DNA.</span>\r\nPosters, packaging, banners, websites — all your design projects start with Photoshop. Combine photos and text to create entirely new images. Work with unlimited layers and masks. And paint with brushes that you control with stylus or touch on your iPad.\r\n<span style=\"font-weight: bold; \">Here. There. Everywhere.</span>\r\nStart on your iPad and finish on your desktop — your work is automatically saved to the cloud and your PSDs are the same, no matter where you are.\r\n<br /><span style=\"font-weight: bold;\">Powerful meets portable.</span>\r\nThe creative power of Photoshop is now on your iPad. Open full-size PSDs, create sophisticated composites, retouch images, and control brushes with your finger or Apple Pencil. We’re just getting started, so stay tuned as we roll out exciting new features in the months ahead.","shortDescription":"Adobe Photoshop is a raster graphics editor developed and published by Adobe Inc. for Windows and macOS.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Adobe Photoshop","keywords":"","description":"<span style=\"font-weight: bold; \">Creativity is everywhere. Now Photoshop is too.</span>\r\n<br /><span style=\"font-weight: bold; \">Powering the creative world.</span>\r\nThe world’s best imaging and graphic design software is at the core of just about every creat","og:title":"Adobe Photoshop","og:description":"<span style=\"font-weight: bold; \">Creativity is everywhere. Now Photoshop is too.</span>\r\n<br /><span style=\"font-weight: bold; \">Powering the creative world.</span>\r\nThe world’s best imaging and graphic design software is at the core of just about every creat","og:image":"https://old.roi4cio.com/fileadmin/user_upload/adobe_logo.png"},"eventUrl":"","translationId":6017,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":257,"title":"Web Design and Development Tools","alias":"web-design-and-development-tools","description":" If your business is not active on the internet, then you can miss the great opportunity to get the various benefits. A website of a business is a must for gaining popularity and profits. Through a business website, you can easily sell your products and services. In the present, every single person is active on the internet and searches the services through the internet or Google search engine. If you would like to build a website, then you have to hire the best web design and development services. Web design is collecting ideas and implementing them, guided by certain principles for specific purposes. Web design contains various parameters such as layout, color, graphics, fonts, and contents.\r\nWeb development is different than web design, but the main task of web development is maintaining and building the website. It gives actual life to design files. If you want to get the best web design and development services to create the perfect and unique website of your business, then you have to hire a professional company. If you don’t want to hire a professional, then you can get the help of tools. On the internet, several web design and development tools are available which helps to build your effective business website at a reasonable cost. With the help of the designing tool, you can easily save your money and time.\r\nWeb designers use a variety of different tools depending on what part of the production process they are involved in. These tools are updated over time by newer standards and software but the principles behind them remain the same. Web designers use both vector and raster graphics editors to create web-formatted imagery or design prototypes. Technologies used to create websites include W3C standards like HTML and CSS, which can be hand-coded or generated by WYSIWYG editing software. Other tools web designers might use include mark up validators and other testing tools for usability and accessibility to ensure their websites meet web accessibility guidelines.","materialsDescription":"<span style=\"font-weight: bold;\"> What is included in a creation of website design?</span>\r\nWeb design has very big differences from ordinary printing design. Creating a website design is usually a certain process, which takes into account various requirements of not only artistic but also technical nature. Such a process may include several stages:\r\n<ul><li>development of an attractive, easily perceived design of the start page, as well as other sections and subsequent levels (including various forms of registrations, baskets, etc.);</li><li>development and coordination of a well-designed structure of the entire site;</li><li>designing a convenient, fairly simple site navigation;</li><li>correctly positioned text on the pages;</li><li>availability of opportunities for simple support and expansion of the site.</li></ul>\r\n<span style=\"font-weight: bold;\">What design to choose when creating a site?</span>\r\nWhen creating a website design, you must take into account its theme.\r\nSo, a commercial website should attract visitors with its memorable look and corporate identity that is specific to your company. And, at the same time, be convenient and contain all the information necessary for the user about you and your goods, services. Not to mention the fact that various forms of receiving on-line consultations, placing orders, etc. are welcome on such a site. The presence of such functions and their intuitiveness and accessibility for the site user significantly increases what is commonly called the "site conversion". Those. how much your site will be "selling", and whether it can not only be an analogue of your company's business card on the Internet, but also attract new, by no means virtual clients for your business. Therefore, the creation of a website design of this kind should be carried out very carefully in order to fully reflect the individuality of the image of the company.\r\nSometimes it is recommended to adhere to a concise style, which is able to emphasize your uniqueness and stability as a company. In other cases (for example, if we are talking about the sites of wedding agencies), a certain tone is considered to be a certain romance and tenderness of the color scheme, combined with joyful, bright elements. And sites that appeal to potential customers with unusual requests are simply obliged to have a unique, sometimes very extravagant design (while maintaining, however, the basic principles of good usability - the simplicity and convenience of using your Internet resource).\r\nIf you plan, for example, to launch an information site, then its design should be designed in a strict style, without flashy colors, since in this case it is the content that is more important than the design.\r\nHowever, the last statement is true for any site. Indeed, sometimes it doesn’t matter how beautiful the wrapper is, if instead of candy inside the user finds a dummy. The content of the site, its content and how convenient it is for the user to receive the information he needs on your site is the most important thing! Alas, in the Russian Internet zone, so far, 9 out of 10 sites (even with an excellent initial design) are simply “killed” by inappropriate or uninteresting user content. And then, simply, its absence.\r\n<span style=\"font-weight: bold;\">Web design when creating sites: beauty or functionality?</span>\r\nWhen creating the design of the future site, it is important to remember, first of all, the functionality and the tasks that the future site will have to solve. And, therefore, remember about those for whom you are creating it - about future users. An overly elaborate design or an inconvenient menu, the difficulty of finding the necessary information on the site - this can lead to the fact that your visitor will go to other sites. Those. to your competitors.\r\nThe user of the Internet network often does not care about designer delights or the “coolness” of a programmer who has implemented non-standard site navigation, which you can’t even figure out without additional instructions. A site visitor came to you for information. And it is important, first of all, how quickly he found her, how much she met his needs, how much she helped in solving him, the user of the problem.\r\nThen the site will be remembered, and the visitor will not only return to you himself, but also, perhaps, will bring friends.\r\nA good web designer is not only, and not so much an artist, as a very thoughtful and experienced Internet resource designer who will attract attention, while remaining convenient and in demand within the framework of your marketing policy.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Web_Design_and_Development_Tools.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3215,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Oracle_Enterprise_Manager.png","logo":true,"scheme":false,"title":"Oracle Enterprise Manager","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":150,"alias":"oracle-enterprise-manager","companyTitle":"Oracle","companyTypes":["supplier","vendor"],"companyId":164,"companyAlias":"oracle","description":"<span style=\"color: rgb(97, 97, 97); \">Oracle Enterprise Manager (OEM or EM) is a set of web-based tools aimed at managing software and hardware produced by Oracle Corporation as well as by some non-Oracle entities.</span>\r\n<span style=\"font-weight: bold; \"><span style=\"color: rgb(97, 97, 97); \">Modern Systems Management</span></span>\r\nAs an IT operations professional, your job is more critical than ever because cloud operations are now a fact of life. From managing on-premises assets to deploying and managing new applications to the cloud, Oracle provides a comprehensive solution for managing your environments with Oracle Management Cloud and Oracle Enterprise Manager.\r\nOracle Enterprise Manager has traditionally provided deep management for the Oracle stack using an on-premises delivery method. Oracle Management Cloud is our next-generation, cloud-based management offering powered by machine learning and big data analytics.\r\n<span style=\"font-weight: bold; \">An Extensive Portfolio of Management Solutions</span>\r\n<span style=\"font-weight: bold; \">Cloud Management</span>\r\nFor existing Oracle Enterprise Manager customers, managing cloud assets is possible right within the cloud control user interface. For new customers, the easiest way to monitor cloud assets is to use Oracle Management Cloud.\r\n<span style=\"font-weight: bold; \">Application Management</span>\r\nManage Oracle packaged applications, including - but not limited to - Oracle E-Business Suite, Siebel, PeopleSoft, JD Edwards EnterpriseOne, Tax and Utilities, Oracle Communications applications, and Primavera.\r\n<span style=\"font-weight: bold; \">Middleware Management</span>\r\nOracle Enterprise Manager provides a comprehensive management solution for Oracle WebLogic Server, Oracle Fusion Middleware, and non-Oracle middleware technology such as Apache Tomcat, JBoss Application Server, and IBM WebSphere Application Server. The solution offers capabilities spanning configuration and compliance management, patching, provisioning, and performance management, as well as administration and auditing.\r\n<span style=\"font-weight: bold; \">Database Management</span>\r\nTake advantage of Oracle&rsquo;s time-tested and popular solutions including Diagnostics Pack, Tuning Pack, Real Application Testing, and related technologies to manage Oracle Databases.\r\n<span style=\"font-weight: bold; \">Hardware and Virtualization Management</span>\r\nManage physical and virtual server environments including Oracle Solaris and Oracle Linux operating systems and virtual environments (Solaris Zones and OVM for SPARC).\r\n<span style=\"font-weight: bold; \">Application Performance Management</span>\r\nManage web and Java applications built on Oracle WebLogic Server and Oracle Databases. Monitor web browser activity and application transactions to optimize user experience and application performance.\r\n<span style=\"font-weight: bold; \">Application Quality Management</span>\r\nA complete testing solution for Oracle Database, Oracle packaged applications, and custom web applications.\r\n<span style=\"font-weight: bold; \">Engineered Systems Management</span>\r\nManage Exadata Database Machine with comprehensive lifecycle management, from monitoring to management and ongoing maintenance.\r\n<span style=\"font-weight: bold; \">Lifecycle Management</span>\r\nPowerful capabilities to aid consolidation, enforce standardization, and deploy automation.\r\n<span style=\"font-weight: bold;\">Heterogeneous Management</span>\r\nExtend Oracle Enterprise Manager to monitor non-Oracle technologies. For customers new to Oracle Enterprise Manager, please review Oracle Management Cloud for cloud-based monitoring of heterogeneous environments.","shortDescription":"Enterprise Manager allows administrators to manage the work of complex information systems built primarily on the basis of Oracle technologies, including software products from other companies.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Oracle Enterprise Manager","keywords":"","description":"<span style=\"color: rgb(97, 97, 97); \">Oracle Enterprise Manager (OEM or EM) is a set of web-based tools aimed at managing software and hardware produced by Oracle Corporation as well as by some non-Oracle entities.</span>\r\n<span style=\"font-weight: bold; \"><s","og:title":"Oracle Enterprise Manager","og:description":"<span style=\"color: rgb(97, 97, 97); \">Oracle Enterprise Manager (OEM or EM) is a set of web-based tools aimed at managing software and hardware produced by Oracle Corporation as well as by some non-Oracle entities.</span>\r\n<span style=\"font-weight: bold; \"><s","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Oracle_Enterprise_Manager.png"},"eventUrl":"","translationId":3216,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":243,"title":"Database Development and Management Tools","alias":"database-development-and-management-tools","description":" Many companies create various multi-functional applications to facilitate the management, development and administration of databases.\r\nMost relational databases consist of two separate components: a “back-end” where data is stored and a “front-end” —a user interface for interacting with data. This type of design is smart enough, as it parallels a two-level programming model that separates the data layer from the user interface and allows you to concentrate the software market directly on improving its products. This model opens doors for third parties who create their own applications for interacting with various databases.\r\nDatabase development tools can be used to create varieties of the following programs:\r\n<ul><li>client programs;</li><li>database servers and their individual components;</li><li>custom applications.</li></ul>\r\nThe programs of the first and second types are rather small since they are intended mainly for system programmers. The third type packages are much larger, but smaller than full-featured DBMS.\r\nThe development tools for custom applications include programming systems, various program libraries for various programming languages, and development automation packages (including client-server systems).<br />Database management system, abbr. DBMS (Eng. Database Management System, abbr. DBMS) - a set of software and linguistic tools for general or special purposes, providing management of the creation and use of databases.\r\nDBMS - a set of programs that allow you to create a database (DB) and manipulate data (insert, update, delete and select). The system ensures the safety, reliability of storage and data integrity, as well as provides the means to administer the database.","materialsDescription":" <span style=\"font-weight: bold;\">The main functions of the DBMS:</span>\r\n<ul><li>data management in external memory (on disk);</li><li>data management in RAM using disk cache;</li><li>change logging, backup and recovery of databases after failures;</li><li>support for database languages (data definition language, data manipulation language).</li></ul>\r\n<span style=\"font-weight: bold;\">The composition of the DBMS:</span>\r\nUsually, a modern DBMS contains the following components:\r\n<ul><li>the core, which is responsible for managing data in external and RAM and logging;</li><li>database language processor, which provides the optimization of requests for the extraction and modification of data and the creation, as a rule, of a machine-independent executable internal code;</li><li>a run-time support subsystem that interprets data manipulation programs that create a user interface with a DBMS;<br />service programs (external utilities) that provide a number of additional capabilities for maintaining an information system.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Database_Development_and_Management_Tools.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5520,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IBM.png","logo":true,"scheme":false,"title":"IBM Proventia Network IPS","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":100,"alias":"ibm-proventia-network-ips","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"The <b>IBM Proventia Network Intrusion Prevention System (IPS)</b> is designed to block Internet threats before they adversely affect your business. This system protects all three network levels: the internal perimeter, the external perimeter, and the remote segments. Featuring proprietary technology that combines performance that matches the speed of data transmission over the network, intelligent security features and multi-level security, IBM Internet Security Systems (ISS) provides proactive protection - protection against the threat before it reaches its goal. \r\n<ul> <li>Performance </li> <li> Security </li> <li> Reliability </li> <li> Implementation </li> <li> Management </li> <li> Confidentiality.</li> </ul>\r\n<b>Do not compromise when it comes to protection or performance</b>\r\nSecurity should increase network performance, not decrease it. The specialized device Proventia Network IPS has high bandwidth, low latency and long uptime, which ensures efficient and safe network operation. It has the following distinctive features:\r\n<ul> <li>Wide bandwidth range (10 Mbps - 5 Gbps) </li> <li> Intelligent in-depth packet inspection using FlowSmart technology </li> <li> Low latency </li> <li> Data transmission in case of system error or power outages</li> </ul>\r\nSecurity is only achieved with proactive protection. The Proventia Network IPS is designed to protect networks from all types of attacks, including: \r\n<ul> <li> Network worms </li> <li> spyware attacks </li> <li> P2P applications </li> <li> denial of service (DOS) and distributed attacks ( DDOS) </li> <li> cross-site scripting </li> <li> SQL injection </li> <li> phishing </li> <li> buffer overflow attacks </li> <li> tracking paths in web server directories</li> </ul>","shortDescription":"Securing networks with the IBM Proventia Network Intrusion Prevention System","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM Proventia Network IPS","keywords":"","description":"The <b>IBM Proventia Network Intrusion Prevention System (IPS)</b> is designed to block Internet threats before they adversely affect your business. This system protects all three network levels: the internal perimeter, the external perimeter, and the remote s","og:title":"IBM Proventia Network IPS","og:description":"The <b>IBM Proventia Network Intrusion Prevention System (IPS)</b> is designed to block Internet threats before they adversely affect your business. This system protects all three network levels: the internal perimeter, the external perimeter, and the remote s","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IBM.png"},"eventUrl":"","translationId":5521,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}