{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"role-supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"products-popover":{"de":"die produkte","ru":"Продукты","_type":"localeString","en":"Products"},"introduction-popover":{"ru":"внедрения","_type":"localeString","en":"introduction"},"partners-popover":{"ru":"партнеры","_type":"localeString","en":"partners"},"update-profile-button":{"en":"Update profile","ru":"Обновить профиль","_type":"localeString"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"user-implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"categories":{"en":"Categories","ru":"Компетенции","_type":"localeString"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"_type":"localeString","en":"Partnership with vendors","ru":"Партнерство с производителями"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 reference"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"en":"Country","ru":"Страна","_type":"localeString"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"en":"branch","ru":"область деятельности","_type":"localeString"},"employees-popover":{"_type":"localeString","en":"number of employees","ru":"количество сотрудников"},"partnership-programme":{"ru":"Партнерская программа","_type":"localeString","en":"Partnership program"},"partner-discounts":{"en":"Partner discounts","ru":"Партнерские скидки","_type":"localeString"},"registered-discounts":{"_type":"localeString","en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"en":"Partner level requirements","ru":"Требования к уровню партнера","_type":"localeString"},"certifications":{"ru":"Сертификация технических специалистов","_type":"localeString","en":"Certification of technical specialists"},"sales-plan":{"ru":"Годовой план продаж","_type":"localeString","en":"Annual Sales Plan"},"partners-vendors":{"ru":"Партнеры-производители","_type":"localeString","en":"Partners-vendors"},"partners-suppliers":{"ru":"Партнеры-поставщики","_type":"localeString","en":"Partners-suppliers"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"ru":"Производимые продукты","_type":"localeString","en":"Produced products"},"vendor-implementations":{"ru":"Производимые внедрения","_type":"localeString","en":"Produced deployments"},"supplier-implementations":{"ru":"Поставляемые внедрения","_type":"localeString","en":"Supplied deployments"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"_type":"localeString","en":"Events schedule","ru":"Pасписание событий"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"register":{"ru":"Регистрация ","_type":"localeString","en":"Register"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"_type":"localeString","en":"Company presentation","ru":"Презентация компании"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"_type":"localeString","en":"Requests","de":"References","ru":"Мои запросы"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"de":"Über uns","ru":"О нас","_type":"localeString","en":"About us"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"en":"Subscriptions","de":"Tarife","ru":"Тарифы","_type":"localeString"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"translatable_meta":[{"translations":{"ru":"Компания","_type":"localeString","en":"Company"},"name":"title"},{"name":"description","translations":{"ru":"Описание компании","_type":"localeString","en":"Company description"}},{"name":"keywords","translations":{"en":"Company keywords","ru":"Ключевые слова для компании","_type":"localeString"}}],"title":{"ru":"ROI4CIO: Компания","_type":"localeString","en":"ROI4CIO: Company"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"rpost":{"id":8367,"title":"RPost","logoURL":"https://old.roi4cio.com/uploads/roi/company/1_RPost.png","alias":"rpost","address":"Los Angeles, CA","roles":[{"id":3,"type":"vendor"}],"description":"RPost® is a global leader in e-signature and cybersecurity services, specializing in email encryption for privacy and compliance, e-signature automation, legal e-delivery proof, document rights management, and AI-infused services to prevent data leaks and human e-security errors.\r\nRPost’s AI-infused RMail® e-security, RSign® e-signature, and Registered Email™ e-compliance platforms have had more than 50 patents granted on their core technologies, having received international awards and accolades including the World Mail Award for Best in Security, Initiative Mittelstand Best Innovation in IT Award in Germany, and APCC Top Choice for GDPR Email Data Privacy Compliance. \r\nMore than 25 million users have enjoyed RPost’s track, prove, encrypt, e-sign, certify, share, and protect services for more than a decade in more than 100 countries. Our largest customers are some of the world’s most respected brands across industry and geography. \r\nOur mission is to help our customers worldwide communicate and transact electronically in the most secure, compliant, and productive ways possible and to continuously innovate our products to support their evolving needs. We successfully accomplish this through our expert teams and partners everywhere.","companyTypes":["vendor"],"products":{},"vendoredProductsCount":2,"suppliedProductsCount":2,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{"32":{"id":32,"title":"IT outsourcing","description":"<span style=\"font-weight: bold; \">IT outsourcing</span> is the use of external service providers to effectively deliver IT-enabled business process, application service and infrastructure solutions for business outcomes.\r\nOutsourcing, which also includes utility services, software as a service and cloud-enabled outsourcing, helps clients to develop the right sourcing strategies and vision, select the right IT service providers, structure the best possible contracts, and govern deals for sustainable win-win relationships with external providers.\r\nOutsourcing can enable enterprises to reduce costs, accelerate time to market, and take advantage of external expertise, assets and/or intellectual property. IT outsourcing can be implemented both ways: outsides or within the country. \r\nIT outsourcing vendors can provide either a fully managed service, meaning they take full responsibility of all IT maintenance and support, or they can provide additional support for an internal IT team when needed, which is known as co-sourced IT support. A company using IT outsourcing can choose to use one provider for all their IT functions or split the work among multiple providers. \r\n<span style=\"font-weight: bold;\">Specific IT services typically outsourced include:</span>\r\n<ul><li>Application development</li><li>Web hosting</li><li>Application support</li><li>Database development</li><li>Telecommunications</li><li>Networking</li><li>Disaster recovery</li><li>Security</li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Reasons for Outsourcing</span></p>\r\n<span style=\"font-weight: bold; \">To Reduce Cost.</span> More often than not, outsourcing means saving money. This is often due to lower labor costs, cheaper infrastructure, or an advantageous tax system in the outsourcing location.<br /><span style=\"font-weight: bold; \">To Access Skills That Are Unavailable Locally.</span> Resources that are scarce at home can sometimes be found in abundance elsewhere, meaning you can easily reach them through outsourcing.<br /><span style=\"font-weight: bold; \">To Better Use Internal Resources</span>. By delegating some of your business processes to a third party, you’ll give your in-house employees the opportunity to focus on more meaningful tasks.<br /><span style=\"font-weight: bold; \">To Accelerate Business Processes.</span> When you stop wasting time on mundane, time-consuming processes, you’ll be able to move forward with your core offering a lot faster.<br /><span style=\"font-weight: bold; \">To Share Risks.</span> When you delegate a part of non-focus functionality by outsourcing it to a third-party vendor, you give away the responsibility and related risks.","materialsDescription":"<h3 class=\"align-center\">What are the Types of IT Outsourcing?</h3>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Project-Based Model.</span> The client hires a team to implement the part of work that is already planned and defined. The project manager from the outsourced team carries full responsibility for the quality and performance of the project.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Dedicated Team Model.</span> The client hires a team that will create a project for them, and they will work only on that project. Unlike the project-based model, a dedicated team is more engaged in your project. In this model, an outsourced team becomes your technical and product advisor. So it can offer ideas and suggest alternative solutions.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Outstaff Model.</span> It's a type of outsourcing in IT when you don't need a full-fledged development team and hire separate specialists. Sometimes the project requires finding a couple of additional professionals, and you're free to hire outstaff workers to cover that scope of work.</p>\r\n<h3 class=\"align-center\"><span style=\"font-weight: bold; \">What are IT Outsourcing examples?</span></h3>\r\nThe individual or company that becomes your outsourcing partner can be located anywhere in the world — one block away from your office or on another continent.\r\nA Bay Area-based startup partnering with an app development team in Utah and a call center in the Philippines, or a UK-based digital marketing agency hiring a Magento developer from Ukraine are both examples of outsourcing.\r\n<h3 class=\"align-center\">Why You Should Use IT Outsourcing</h3>\r\nNow that you know what IT outsourcing is, its models, and types, it's time to clarify why you need to outsource and whether you really need it. Let's go over a few situations that suggest when to opt for IT outsourcing.\r\n<ul><li><span style=\"font-weight: bold;\">You are a domain expert with idea</span></li></ul>\r\nIf you're an industry expert with the idea that solves a real problem, IT outsourcing is your choice. In this case, your main goal is to enter the market and test the solution fast. An outsourced team will help you validate the idea, build an MVP to check the hypothesis, and implement changes in your product according to market needs. It saves you money, time and lets you reach the goal.\r\n<ul><li><span style=\"font-weight: bold;\">You have an early-stage startup</span></li></ul>\r\nIt's a common case that young startups spend money faster than they get a solid team and a ready-to-market product. The Failory found that financial problems are the 3rd reason why startup fails. So it makes more sense to reduce costs by hiring an outsourced team of professionals while your business lives on investor's money. You may employ a full-cycle product development studio covering all the blind spots and bringing your product to life.\r\n<ul><li><span style=\"font-weight: bold;\">You need a technical support</span></li></ul>\r\nEven if you already have a ready solution, but it demands some technical improvements – frameworks for backend components, new language, integrations with enterprise software, UX&UI design – it makes more sense to find an experienced partner. There are many functions that IT outsourcing can cover, and again it saves you the time you'd otherwise spend on looking for qualified staff.<br /><br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IT_outsourcing.png","alias":"it-outsourcing"},"40":{"id":40,"title":"Endpoint security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png","alias":"endpoint-security"},"41":{"id":41,"title":"Antispam","description":"In each system, which involves the communication of users, there is always the problem of spam, or the mass mailing of unsolicited emails, which is solved using the antispam system. An antispam system is installed to catch and filter spam at different levels. Spam monitoring and identification are relevant on corporate servers that support corporate email, here the antispam system filters spam on the server before it reaches the mailbox. There are many programs that help to cope with this task, but not all of them are equally useful. The main objective of such programs is to stop sending unsolicited letters, however, the methods of assessing and suppressing such actions can be not only beneficial but also detrimental to your organization. So, depending on the rules and policies of mail servers, your server, or even a domain, may be blacklisted and the transfer of letters will be limited through it, and you may not even be warned about it.\r\nThe main types of installation and use of anti-spam systems:\r\n<ul><li>installation of specialized equipment, a gateway that filters mail before it reaches the server;</li><li>use of external antispam systems for analyzing emails and content;</li><li>setting up an antispam system with the ability to learn on the mail server itself;</li><li>installation of spam filtering software on the client’s computer.</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">Anti-spam technologies:</span>\r\n<span style=\"font-weight: bold;\">Heuristic analysis</span>\r\nExtremely complex, highly intelligent technology for empirical analysis of all parts of a message: header fields, message bodies, etc. Not only the message itself is analyzed. The heuristic analyzer is constantly being improved, new rules are continuously added to it. It works “ahead of the curve” and makes it possible to recognize still unknown varieties of spam of a new generation before the release of available updates.\r\n<span style=\"font-weight: bold;\">Filtering counteraction</span>\r\nThis is one of the most advanced and effective anti-spam technologies. It is to recognize the tricks resorted to by spammers to bypass anti-spam filters.\r\n<span style=\"font-weight: bold;\">HTML based analysis</span>\r\nHTML code comparable to samples of HTML signatures in antispam. Such a comparison, using the available data on the size of typical spam images, protects users from spam messages using HTML-code, which are often included in the online image.\r\n<span style=\"font-weight: bold;\">Spam detection technology for message envelopes</span>\r\nDetection of fakes in the "stamps" of SMTP-servers and in other elements of the e-mail header is the newest direction in the development of anti-spam methods. Email addresses can not be trusted. Fake emails contain more than just spam. For example, anonymous and even threats. Technologies of various anti-spam systems allow you to send such messages. Thus, it provides not only the economic movement, but also the protection of employees.\r\n<span style=\"font-weight: bold;\">Semantic analysis</span>\r\nMeaning in words and phrases is compared with typical spam vocabulary. Comparison of provisions for a special dictionary, for expression and symbols.\r\n<span style=\"font-weight: bold;\">Anti-camming technology</span>\r\nScamming is probably the most dangerous type of spam. All of them have the so-called "Nigerian letters", reports of winnings in the lottery, casino, fake letters and credit services.\r\n<span style=\"font-weight: bold;\">Technical spam filtering</span>\r\nAutomatic notification of e-mail - bounce-messages - to inform users about the malfunction of the postal system (for example, non-delivery of address letters). Attackers can use similar messages. Under the guise of a technical notification, computer service or ordinary spam can penetrate the computer.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Antispam.png","alias":"antispam"},"43":{"id":43,"title":"Data Encryption","description":"<span style=\"font-weight: bold;\">Data encryption</span> translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext. Currently, encryption is one of the most popular and effective data security methods used by organizations. \r\nTwo main types of data encryption exist - <span style=\"font-weight: bold;\">asymmetric encryption</span>, also known as public-key encryption, and <span style=\"font-weight: bold;\">symmetric encryption</span>.<br />The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. The outdated data encryption standard (DES) has been replaced by modern encryption algorithms that play a critical role in the security of IT systems and communications.\r\nThese algorithms provide confidentiality and drive key security initiatives including authentication, integrity, and non-repudiation. Authentication allows for the verification of a message’s origin, and integrity provides proof that a message’s contents have not changed since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny sending the message.\r\nData protection software for data encryption can provide encryption of devices, email, and data itself. In many cases, these encryption functionalities are also met with control capabilities for devices, email, and data. \r\nCompanies and organizations face the challenge of protecting data and preventing data loss as employees use external devices, removable media, and web applications more often as a part of their daily business procedures. Sensitive data may no longer be under the company’s control and protection as employees copy data to removable devices or upload it to the cloud. As a result, the best data loss prevention solutions prevent data theft and the introduction of malware from removable and external devices as well as web and cloud applications. In order to do so, they must also ensure that devices and applications are used properly and that data is secured by auto-encryption even after it leaves the organization.\r\nEncryption software program encrypts data or files by working with one or more encryption algorithms. Security personnel use it to protect data from being viewed by unauthorized users.\r\nTypically, each data packet or file encrypted via data encryption programs requires a key to be decrypted to its original form. This key is generated by the software itself and shared between the data/file sender and receiver. Thus, even if the encrypted data is extracted or compromised, its original content cannot be retrieved without the encryption key. File encryption, email encryption, disk encryption and network encryption are widely used types of data encryption software.<br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is Encryption software?</span></h1>\r\nEncryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet.There are many software products which provide encryption. Software encryption uses a cipher to obscure the content into ciphertext. One way to classify this type of software is by the type of cipher used. Ciphers can be divided into two categories: <span style=\"font-weight: bold;\">public key ciphers</span> (also known as asymmetric ciphers), and <span style=\"font-weight: bold;\">symmetric key ciphers</span>. Encryption software can be based on either public key or symmetric key encryption.\r\nAnother way to classify crypto software is to categorize its purpose. Using this approach, software encryption may be classified into software which encrypts "<span style=\"font-weight: bold;\">data in transit</span>" and software which encrypts "<span style=\"font-weight: bold;\">data at rest</span>". Data in transit generally uses public key ciphers, and data at rest generally uses symmetric key ciphers.\r\nSymmetric key ciphers can be further divided into stream ciphers and block ciphers. Stream ciphers typically encrypt plaintext a bit or byte at a time, and are most commonly used to encrypt real-time communications, such as audio and video information. The key is used to establish the initial state of a keystream generator, and the output of that generator is used to encrypt the plaintext. Block cipher algorithms split the plaintext into fixed-size blocks and encrypt one block at a time. For example, AES processes 16-byte blocks, while its predecessor DES encrypted blocks of eight bytes.<br />There is also a well-known case where PKI is used for data in transit of data at rest.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">How Data Encryption is used?</span></h1>\r\nThe purpose of data encryption is to deter malicious or negligent parties from accessing sensitive data. An important line of defense in a cybersecurity architecture, encryption makes using intercepted data as difficult as possible. It can be applied to all kinds of data protection needs ranging from classified government intel to personal credit card transactions. Data encryption software, also known as an encryption algorithm or cipher, is used to develop an encryption scheme which theoretically can only be broken with large amounts of computing power.\r\nEncryption is an incredibly important tool for keeping your data safe. When your files are encrypted, they are completely unreadable without the correct encryption key. If someone steals your encrypted files, they won’t be able to do anything with them.\r\nThere different types of encryption: hardware and software. Both offer different advantages. So, what are these methods and why do they matter?\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Software Encryption</span></h1>\r\n<p class=\"align-left\">As the name implies, software encryption uses features of encryption software to encrypt your data. Cryptosoft typically relies on a password; give the right password, and your files will be decrypted, otherwise they remain locked. With encryption enabled, it is passed through a special algorithm that scrambles your data as it is written to disk. The same software then unscrambles data as it is read from the disk for an authenticated user.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Pros.</span>Crypto programs is typically quite cheap to implement, making it very popular with developers. In addition, software-based encryption routines do not require any additional hardware.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Cons.</span>Types of encryption software is only as secure as the rest of your computer or smartphone. If a hacker can crack your password, the encryption is immediately undone.<br />Software encryption tools also share the processing resources of your computer, which can cause the entire machine to slow down as data is encrypted/decrypted. You will also find that opening and closing encrypted files is much slower than normal because the process is relatively resource intensive, particularly for higher levels of encryption</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Hardware encryption</span></h1>\r\n<p class=\"align-left\">At the heart of hardware encryption is a separate processor dedicated to the task of authentication and encryption. Hardware encryption is increasingly common on mobile devices. <br />The encryption protection technology still relies on a special key to encrypt and decrypt data, but this is randomly generated by the encryption processor. Often times, hardware encryption devices replace traditional passwords with biometric logons (like fingerprints) or a PIN number that is entered on an attached keypad<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Pros.</span>Hardware offers strong encryption, safer than software solutions because the encryption process is separate from the rest of the machine. This makes it much harder to intercept or break. </p>\r\n<p class=\"align-left\">The use of a dedicated processor also relieves the burden on the rest of your device, making the encryption and decryption process much faster.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Cons.</span>Typically, hardware-based encrypted storage is much more expensive than a software encryption tools. <br />If the hardware decryption processor fails, it becomes extremely hard to access your information.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">The Data Recovery Challenge. </span>Encrypted data is a challenge to recover. Even by recovering the raw sectors from a failed drive, it is still encrypted, which means it is still unreadable. </p>\r\n<p class=\"align-left\">Hardware encrypted devices don’t typically have these additional recovery options. Many have a design to prevent decryption in the event of a component failure, stopping hackers from disassembling them. The fastest and most effective way to deal with data loss on an encrypted device is to ensure you have a complete backup stored somewhere safe. For your PC, this may mean copying data to another encrypted device. For other devices, like your smartphone, backing up to the Cloud provides a quick and simple economy copy that you can restore from. As an added bonus, most Cloud services now encrypt their users’ data too. <br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Data_Encryption.png","alias":"data-encryption"},"52":{"id":52,"title":"SaaS - software as a service","description":"<span style=\"font-weight: bold;\">Software as a service (SaaS)</span> is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is sometimes referred to as "on-demand software", and was formerly referred to as "software plus services" by Microsoft.\r\n SaaS services is typically accessed by users using a thin client, e.g. via a web browser. SaaS software solutions has become a common delivery model for many business applications, including office software, messaging software, payroll processing software, DBMS software, management software, CAD software, development software, gamification, virtualization, accounting, collaboration, customer relationship management (CRM), Management Information Systems (MIS), enterprise resource planning (ERP), invoicing, human resource management (HRM), talent acquisition, learning management systems, content management (CM), Geographic Information Systems (GIS), and service desk management. SaaS has been incorporated into the strategy of nearly all leading enterprise software companies.\r\nSaaS applications are also known as <span style=\"font-weight: bold;\">Web-based software</span>, <span style=\"font-weight: bold;\">on-demand software</span> and<span style=\"font-weight: bold;\"> hosted software</span>.\r\nThe term "Software as a Service" (SaaS) is considered to be part of the nomenclature of cloud computing, along with Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Desktop as a Service (DaaS),managed software as a service (MSaaS), mobile backend as a service (MBaaS), and information technology management as a service (ITMaaS).\r\nBecause SaaS is based on cloud computing it saves organizations from installing and running applications on their own systems. That eliminates or at least reduces the associated costs of hardware purchases and maintenance and of software and support. The initial setup cost for a SaaS application is also generally lower than it for equivalent enterprise software purchased via a site license.\r\nSometimes, the use of SaaS cloud software can also reduce the long-term costs of software licensing, though that depends on the pricing model for the individual SaaS offering and the enterprise’s usage patterns. In fact, it’s possible for SaaS to cost more than traditional software licenses. This is an area IT organizations should explore carefully.<br />SaaS also provides enterprises the flexibility inherent with cloud services: they can subscribe to a SaaS offering as needed rather than having to buy software licenses and install the software on a variety of computers. The savings can be substantial in the case of applications that require new hardware purchases to support the software.<br /><br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Who uses SaaS?</span></h1>\r\nIndustry analyst Forrester Research notes that SaaS adoption has so far been concentrated mostly in human resource management (HRM), customer relationship management (CRM), collaboration software (e.g., email), and procurement solutions, but is poised to widen. Today it’s possible to have a data warehouse in the cloud that you can access with business intelligence software running as a service and connect to your cloud-based ERP like NetSuite or Microsoft Dynamics.The dollar savings can run into the millions. And SaaS installations are often installed and working in a fraction of the time of on-premises deployments—some can be ready in hours. \r\nSales and marketing people are likely familiar with Salesforce.com, the leading SaaS CRM software, with millions of users across more than 100,000 customers. Sales is going SaaS too, with apps available to support sales in order management, compensation, quote production and configure, price, quoting, electronic signatures, contract management and more.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why SaaS? Benefits of software as a service</span></h1>\r\n<ul><li><span style=\"font-weight: bold;\">Lower cost of entry</span>. With SaaS solution, you pay for what you need, without having to buy hardware to host your new applications. Instead of provisioning internal resources to install the software, the vendor provides APIs and performs much of the work to get their software working for you. The time to a working solution can drop from months in the traditional model to weeks, days or hours with the SaaS model. In some businesses, IT wants nothing to do with installing and running a sales app. In the case of funding software and its implementation, this can be a make-or-break issue for the sales and marketing budget, so the lower cost really makes the difference.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reduced time to benefit/rapid prototyping</span>. In the SaaS model, the software application is already installed and configured. Users can provision the server for the cloud and quickly have the application ready for use. This cuts the time to benefit and allows for rapid demonstrations and prototyping. With many SaaS companies offering free trials, this means a painless proof of concept and discovery phase to prove the benefit to the organization. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Pay as you go</span>. SaaS business software gives you the benefit of predictable costs both for the subscription and to some extent, the administration. Even as you scale, you can have a clear idea of what your costs will be. This allows for much more accurate budgeting, especially as compared to the costs of internal IT to manage upgrades and address issues for an owned instance.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">The SaaS vendor is responsible for upgrades, uptime and security</span>. Under the SaaS model, since the software is hosted by the vendor, they take on the responsibility for maintaining the software and upgrading it, ensuring that it is reliable and meeting agreed-upon service level agreements, and keeping the application and its data secure. While some IT people worry about Software as a Service security outside of the enterprise walls, the likely truth is that the vendor has a much higher level of security than the enterprise itself would provide. Many will have redundant instances in very secure data centers in multiple geographies. Also, the data is being automatically backed up by the vendor, providing additional security and peace of mind. Because of the data center hosting, you’re getting the added benefit of at least some disaster recovery. Lastly, the vendor manages these issues as part of their core competencies—let them.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Integration and scalability.</span> Most SaaS apps are designed to support some amount of customization for the way you do business. SaaS vendors create APIs to allow connections not only to internal applications like ERPs or CRMs but also to other SaaS providers. One of the terrific aspects of integration is that orders written in the field can be automatically sent to the ERP. Now a salesperson in the field can check inventory through the catalog, write the order in front of the customer for approval, send it and receive confirmation, all in minutes. And as you scale with a SaaS vendor, there’s no need to invest in server capacity and software licenses. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Work anywhere</span>. Since the software is hosted in the cloud and accessible over the internet, users can access it via mobile devices wherever they are connected. This includes checking customer order histories prior to a sales call, as well as having access to real time data and real time order taking with the customer.</li></ul>\r\n<p class=\"align-left\"> </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/SaaS__1_.png","alias":"saas-software-as-a-service"},"483":{"id":483,"title":"Messaging Security","description":"<span style=\"font-weight: bold; \">Messaging security</span> is a subcategory of <span style=\"font-style: italic; \">unified threat management (UTM) </span>focused on securing and protecting an organization’s communication infrastructure. Communication channels can include email software, messaging apps, and social network IM platforms. This extra layer of security can help secure devices and block a wider range of viruses or malware attacks.\r\nMessaging security helps to ensure the confidentiality and authenticity of an organization’s communication methods. Confidentiality refers to making sure only the intended recipients are able to read the messages and authenticity refers to making sure the identity of each sender or recipient is verified.\r\nOftentimes, attackers aim to gain access to an entire network or system by infiltrating the messaging infrastructure. Implementing proper data and message security can minimize the chance of data leaks and identity theft.\r\n<span style=\"color: rgb(97, 97, 97); \">Encrypted messaging (also known as secure messaging) provides end-to-end encryption for user-to-user text messaging. Encrypted messaging prevents anyone from monitoring text conversations. Many encrypted messenger apps also offer end-to-end encryption for phone calls made using the apps, as well as for files that are sent using the apps.</span>\r\nTwo modern methods of encryption are the <span style=\"font-style: italic; \">Public Key (Asymmetric)</span> and the <span style=\"font-style: italic; \">Private Key (Symmetric</span>) methods. While these two methods of encryption are similar in that they both allow users to encrypt data to hide it from the prying eyes of outsiders and then decrypt it for viewing by an authorized party, they differ in how they perform the steps involved in the process.\r\n<span style=\"font-weight: bold; \">Email</span> security message can rely on public-key cryptography, in which users can each publish a public key that others can use to encrypt messages to them, while keeping secret a private key they can use to decrypt such messages or to digitally encrypt and sign messages they send. \r\n<span style=\"font-weight: bold;\">Encrypted messaging systems </span>must be encrypted end-to-end, so that even the service provider and its staff are unable to decipher what’s in your communications. Ideal solutions is “server-less” encrypted chat where companies won’t store user information anywhere.\r\nIn a more general sense, users of unsecured public Wi-Fi should also consider using a <span style=\"font-weight: bold;\">Virtual Private Network </span>(VPN) application, to conceal their identity and location from Internet Service Providers (ISPs), higher level surveillance, and the attentions of hackers.","materialsDescription":"<h1 class=\"align-center\"> What is messaging security?</h1>\r\nMessaging Security is a program that provides protection for companies' messaging infrastructure. The programs include IP reputation-based anti-spam, pattern-based anti-spam, administrator-defined block/allow lists, mail antivirus, zero-hour malware detection, and email intrusion prevention.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Six Dimensions of Comprehensive Messaging Security</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">IP-Reputation Anti-spam.</span> It checks each email connection request with a database of IP addresses to establish whether a sender is a legitimate or known spam sender and malware. If a sender is recognized it undesirable the messaging Security program drops the connection before the message is accepted.</li><li><span style=\"font-weight: bold; \">Pattern-based anti-spam</span> utilizes a proprietary algorithm to establish a fingerprint-like signature of email messages. When a message comes in, its pattern is calculated and checked against a database to determine if the message matches a known email pattern. </li><li><span style=\"font-weight: bold; \">Block/Allow List Anti-spam.</span> Administrators can create a list of IP addresses or domains that they would like to either block or allow. This method ensures that trusted sources are explicitly allowed and unwanted sources are explicitly denied access.</li><li><span style=\"font-weight: bold; \">Mail Antivirus.</span> This layer of protection blocks a wide range of known viruses and malware attacks.</li><li><span style=\"font-weight: bold; \">Zero-Hour Malware Protection.</span> By analyzing large numbers of messages, outbreaks are detected along with their corresponding messages. These message patterns are then flagged as malicious, giving information about a given attack.</li><li><span style=\"font-weight: bold; \">SmartDefense Email IPS.</span> The messaging security program utilizes SmartDefense Email IPS to stop attacks targeting the messaging infrastructure. </li></ul>\r\n<h1 class=\"align-center\">What are Signal, Wire and LINE messenger security apps like ?</h1>\r\n<p class=\"align-left\">Secure private messenger is a messaging application that emphasizes the privacy and of users using encryption and service transparency. While every modern messenger system is using different security practices (most prominently SSL/HTTPS) - the difference between secure and classic messengers is what we don’t know in the scope of implementation and approach to user data. </p>\r\n<p class=\"align-left\">Message access control and secure messengers evolved into a distinct category due to the growing awareness that communication over the internet is accessible by third parties, and reasonable concerns that the messages can be used against the users.</p>\r\n<h1 class=\"align-center\">Why secure communication is essential for business?</h1>\r\n<p class=\"align-left\">In the context of business operation, communication is a vital element of maintaining an efficient and dynamic working process. It lets you keep everything up to date and on the same page. And since many things are going on at the same time - tools like messengers are one of the many helpers that make the working day a little more manageable.</p>\r\n<p class=\"align-left\">Some of the information, like employee and customer data, proprietary information, data directly linked to business performance or future projections, may be strictly under a non-disclosure agreement. Without proper text message authentication in information security or encryption, it remains vulnerable to exposure. The chances are slim, but the possibility remains. </p>\r\n<p class=\"align-left\">And there are people interested in acquiring that sensitive information, people who like to play dirty because getting a competitive advantage is a decent motivation to go beyond the law. And when private conversations leak, especially the business-related ones - the impact is comparable with the Titanic hitting an iceberg. </p>\r\n<p class=\"align-left\">Encrypted massages in messenger prevents this from happening.</p>\r\n<p class=\"align-left\"> </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Messaging_Security.png","alias":"messaging-security"},"856":{"id":856,"title":"Secure Communications","description":" <span style=\"font-weight: bold;\">Secure communication</span> is when two entities are communicating and do not want a third party to listen in. For that, they need to communicate in a way not susceptible to eavesdropping or interception. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what was said. Other than spoken face-to-face communication with no possible eavesdropper, it is probably safe to say that no communication is guaranteed secure in this sense, although practical obstacles such as legislation, resources, technical issues (interception and encryption), and the sheer volume of communication serve to limit surveillance.\r\nWith many communications taking place over long distances and mediated by technology, and increasing awareness of the importance of interception issues, technology, and its compromise are at the heart of this debate.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Encryption</span></span> is a method in which data is rendered hard to read by an unauthorized party. Since encryption methods are created to extremely hard to break, many communication methods either use deliberately weaker encryption than possible or have backdoors inserted to permit rapid decryption. In some cases, government authorities have required backdoors to be installed in secret. Many methods of encryption are also subject to "man in the middle" attack whereby a third party who can 'see' the establishment of the secure communication is made privy to the encryption method, this would apply for example to the interception of computer use at an ISP. Provided it is correctly programmed, sufficiently powerful, and the keys not intercepted, encryption would usually be considered secure.\r\nEncryption can be implemented in a way that requires the use of encryption, i.e. if encrypted communication is impossible then no traffic is sent, or opportunistically. Opportunistic encryption is a lower security method to generally increase the percentage of generic traffic which is encrypted. This is analogous to beginning every conversation with "Do you speak Navajo?" If the response is affirmative, then the conversation proceeds in Navajo, otherwise, it uses the common language of the two speakers. This method does not generally provide authentication or anonymity but it does protect the content of the conversation from eavesdropping.\r\nAn Information-theoretic security technique known as physical layer encryption ensures that a wireless communication link is provably secure with communications and coding techniques.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Steganography</span></span> ("hidden writing") is also the means by which data can be hidden within other more innocuous data. Thus a watermark proving ownership embedded in the data of a picture, in such a way it is hard to find or remove unless you know how to find it. Or, for communication, the hiding of important data (such as a telephone number) in apparently innocuous data (an MP3 music file). An advantage of steganography is plausible deniability, that is unless one can prove the data is there (which is usually not easy), it is deniable that the file contains any.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Identity-based networks</span></span> are one of the tools to obtain security. Unwanted or malicious behavior is possible on the web since the internet is inherently anonymous. True identity-based networks replace the ability to remain anonymous and are inherently more trustworthy since the identity of the sender and recipient are known. (The telephone system is an example of an identity-based network.)\r\nRecently, <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">anonymous networking</span></span> also has been used to secure communications. In principle, a large number of users running the same system can have communications routed between them in such a way that it is very hard to detect what the complete message is, which user sent it, and where it is ultimately coming from or going to. Examples are Crowds, Tor, I2P, Mixminion, various anonymous P2P networks, and others.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Anonymous communication devices</span></span> are also one of the tools to obtain security. In theory, an unknown device would not be noticed, since so many other devices are in use. This is not altogether the case in reality, due to the presence of systems such as Carnivore and Echelon, which can monitor communications over entire networks and the fact that the far end may be monitored as before. Examples include payphones, Internet cafes, etc.\r\nPrograms offering more security are <span style=\"font-weight: bold;\">secure instant messaging, VoIP, secure email, IRC and webchat,</span> and so on.","materialsDescription":" <span style=\"font-weight: bold; \">What are the types of security?</span>\r\nSecurity can be broadly categorized under the following headings, with examples:\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">1. Hiding the content or nature of a communication</span></span>\r\n<ul><li><span style=\"font-style: italic; \">Code</span> – a rule to convert a piece of information (for example, a letter, word, phrase, or gesture) into another form or representation (one sign into another sign), not necessarily of the same type. In communications and information processing, encoding is the process by which information from a source is converted into symbols to be communicated. Decoding is the reverse process, converting these code symbols back into information understandable by a receiver. One reason for coding is to enable communication in places where ordinary spoken or written language is difficult or impossible. For example, semaphore, where the configuration of flags held by a signaler or the arms of a semaphore tower encodes parts of the message, typically individual letters, and numbers. Another person standing a great distance away can interpret the flags and reproduce the words sent.</li><li><span style=\"font-style: italic; \">Encryption</span></li><li><span style=\"font-style: italic; \">Steganography</span></li><li><span style=\"font-style: italic; \">Identity-Based</span></li></ul>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">2. Hiding the parties to a communication – preventing identification, promoting anonymity</span></span>\r\n<ul><li>"Crowds" and similar anonymous group structures – it is difficult to identify who said what when it comes from a "crowd"</li><li>Anonymous communication devices – unregistered cellphones, Internet cafes</li><li>Anonymous proxies</li><li>Hard to trace routing methods – through unauthorized third-party systems, or relays</li></ul>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">3. Hiding the fact that communication takes place</span></span>\r\n<ul><li>"Security by obscurity" – similar to a needle in a haystack</li><li>Random traffic – creating random data flow to make the presence of genuine communication harder to detect and traffic analysis less reliable</li></ul>\r\nEach of the three is important, and depending on the circumstances any of these may be critical. For example, if a communication is not readily identifiable, then it is unlikely to attract attention for identification of parties, and the mere fact communication has taken place (regardless of content) is often enough by itself to establish an evidential link in legal prosecutions. It is also important with computers, to be sure where the security is applied, and what is covered.\r\n<span style=\"font-weight: bold; \">What are the methods used to "break" security?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Bugging</span></span>\r\nThe placing covertly of monitoring and/or transmission devices either within the communication device, or in the premises concerned.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Computers (general)</span></span>\r\nAny security obtained from a computer is limited by the many ways it can be compromised – by hacking, keystroke logging, backdoors, or even in extreme cases by monitoring the tiny electrical signals given off by keyboard or monitors to reconstruct what is typed or seen (TEMPEST, which is quite complex).\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Laser audio surveillance</span></span>\r\nSounds, including speech, inside rooms, can be sensed by bouncing a laser beam off a window of the room where a conversation is held and detecting and decoding the vibrations in the glass caused by the sound waves.\r\n<span style=\"font-weight: bold; \">What are the systems offering partial security?</span>\r\n<span style=\"font-weight: bold; \">Anonymous cellphones.</span> Cellphones can easily be obtained, but are also easily traced and "tapped". There is no (or only limited) encryption, the phones are traceable – often even when switched off – since the phone and SIM card broadcast their International Mobile Subscriber Identity (IMSI). It is possible for a cellphone company to turn on some cellphones when the user is unaware and use the microphone to listen in on you, and according to James Atkinson, a counter-surveillance specialist cited in the same source, "Security-conscious corporate executives routinely remove the batteries from their cell phones" since many phones' software can be used "as-is", or modified, to enable transmission without user awareness and the user can be located within a small distance using signal triangulation and now using built-in GPS features for newer models. Transceivers may also be defeated by jamming or Faraday cage.\r\nSome cellphones (Apple's iPhone, Google's Android) track and store users' position information so that movements for months or years can be determined by examining the phone.\r\n<span style=\"font-weight: bold; \">Landlines.</span> Analog landlines are not encrypted, it lends itself to being easily tapped. Such tapping requires physical access to the line which can be easily obtained from a number of places, e.g. the phone location, distribution points, cabinets and the exchange itself. Tapping a landline in this way can enable an attacker to make calls that appear to originate from the tapped line.\r\n<span style=\"font-weight: bold;\">Anonymous Internet.</span> Using a third-party system of any kind (payphone, Internet cafe) is often quite secure, however, if that system is used to access known locations (a known email account or 3rd party) then it may be tapped at the far end, or noted, and this will remove any security benefit obtained. Some countries also impose mandatory registration of Internet cafe users.\r\nAnonymous proxies are another common type of protection, which allows one to access the net via a third party (often in a different country) and make tracing difficult. Note that there is seldom any guarantee that the plaintext is not tappable, nor that the proxy does not keep its own records of users or entire dialogs. As a result, anonymous proxies are a generally useful tool but may not be as secure as other systems whose security can be better assured. Their most common use is to prevent a record of the originating IP, or address, being left on the target site's own records. Typical anonymous proxies are found at both regular websites such as Anonymizer.com and spynot.com, and on proxy sites which maintain up to date lists of large numbers of temporary proxies in operation.\r\nA recent development on this theme arises when wireless Internet connections ("Wi-Fi") are left in their unsecured state. The effect of this is that any person in range of the base unit can piggyback the connection – that is, use it without the owner being aware. Since many connections are left open in this manner, situations where piggybacking might arise (willful or unaware) have successfully led to a defense in some cases, since it makes it difficult to prove the owner of the connection was the downloader or had knowledge of the use to which unknown others might be putting their connection. An example of this was the Tammie Marson case, where neighbors and anyone else might have been the culprit in the sharing of copyright files. Conversely, in other cases, people deliberately seek out businesses and households with unsecured connections, for illicit and anonymous Internet usage, or simply to obtain free bandwidth.\r\n<span style=\"font-weight: bold;\">Programs offering more security.</span>\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Secure instant messaging</span></span> – Some instant messaging clients use end-to-end encryption with forwarding secrecy to secure all instant messages to other users of the same software. Some instant messaging clients also offer end-to-end encrypted file transfer support and group messaging.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">VoIP</span></span> – Some VoIP clients implement ZRTP and SRTP encryption for calls.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Secure email</span></span> – some email networks are designed to provide encrypted and/or anonymous communication. They authenticate and encrypt on the users own computer, to prevent transmission of plain text, and mask the sender and recipient. Mixminion and I2P-Bote provide a higher level of anonymity by using a network of anonymizing intermediaries, similar to how Tor works, but at a higher latency.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">IRC and webchat</span></span> – Some IRC clients and systems use client-to-server encryption such as SSL/TLS. This is not standardized.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/diseno-plano-de-icon.png","alias":"secure-communications"},"858":{"id":858,"title":"Secure File Sharing","description":" Secure file sharing is the process of sharing one or more files securely or privately.\r\nIt enables sharing files between different users/organizations confidentially and/or within a protected mode, secure from intruders or unauthorized users.\r\nSecure file sharing is also known as protected file sharing.\r\nSecure file sharing is generally performed by encrypting the file, either before sharing or when being transmitted over the network. This is done through an encryption algorithm. The file can be shared within a local network or over a standard Internet connection. Secure file sharing can also be done through a private network connection such as a VPN.\r\nMost file-sharing services or software enable secure file sharing by restricting access to the file, such as only granting authorized personnel rights to access, view and download the file.","materialsDescription":" <span style=\"font-weight: bold; \">What is file-sharing security?</span>\r\nFile sharing has grown in popularity and frequency as people work remotely and enterprises move to the cloud. However, any time employees use technology to share files between devices, there are security risks involved. File-sharing can introduce risks of malware infection, hacking, and loss or exposure of sensitive information. Without proper security measures in place, the benefits of file sharing can be significantly outweighed by the potential for exposing your company’s sensitive data to new security threats.\r\n<span style=\"font-weight: bold; \">What Are The Pros and Cons of File Sharing?</span>\r\nThere are a number of factors to keep in mind before you start actively file sharing.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Pros:</span></span>\r\n<ul><li>It allows you to transfer large files over a network connection.</li><li>It makes it easier to collaborate with other people across the globe.</li><li>It reduces the need to maintain a central file server that is always online.</li></ul>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Cons:</span></span>\r\n<ul><li>The amount of bandwidth required can be costly.</li><li>Hard to trace what happens to a file after it is shared publicly.</li><li>Higher risk of acquiring a virus or other type of malware from a remote file.</li></ul>\r\n<span style=\"font-weight: bold; \">What are file-sharing stats?</span>\r\nWhen the topic of file-sharing comes up, most people recall the days of tools like Napster which became popular methods for illegally transferring music content around the internet in the ’90s. Today, however, file sharing is a key function for many businesses and other use cases.\r\n<ul><li>39% of business data that is uploaded to the cloud is used for file-sharing purposes.</li><li>The average company shares files with over 800 different online domains, which includes partners and vendors.</li><li>About 60% of files uploaded to a file sharing service are never actually shared with other people and are instead used as a backup copy.</li><li>About 70% of shared files are spread to only internal users in an organization.</li></ul>\r\n<span style=\"font-weight: bold; \">Secure file-sharing for businesses</span>\r\nSome of the best practices when it comes to ensuring your file-sharing sessions are secure at all times.\r\n<ul><li>Pick a service that offers <span style=\"font-weight: bold; \">end-to-end encryption.</span> This protects you from external hackers and also prevents the host itself from viewing your data.</li><li>Always <span style=\"font-weight: bold; \">double-check permission settings.</span> Most services allow for a public sharing option, but that means that anyone with the right link can obtain your files.</li><li>Run <span style=\"font-weight: bold; \">audits on your files</span> to see who is accessing them. If a file is no longer needed, remove it from your cloud system entirely.</li></ul>\r\n<span style=\"font-weight: bold;\">What are the types of file sharing?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">File Transfer Protocol (FTP)</span></span>\r\nFTP was one of the first methods invented for moving data across networks and it remains very popular today thanks to its reliability and efficiency. FTP actions can be run through a command prompt window or a tool with a user interface. All it requires is for you to specify the source file you want to move and the destination where it should be placed.\r\n<ul><li><span style=\"font-weight: bold;\">Great for:</span> Large files, unusual file types, or legacy data.</li><li><span style=\"font-weight: bold;\">Example programs:</span> FileZilla, Telnet, WinSCP.</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Peer to Peer (P2P)</span></span>\r\nThe purpose of a P2P file transfer is to remove the need for a central server that hosts the data. Instead, individual clients connect to a distributed network of peers and complete the file transfers over their own network connections. P2P might eventually be used to create an unstoppable TOR. Whether or not The Onion Router (TOR) is a truly P2P environment depends on many factors, but its popularity in creating a more secure online connection is unquestioned.\r\n<ul><li><span style=\"font-weight: bold;\">Great for:</span> Sharing files with a small group of people, files that are unavailable in public repositories.</li><li><span style=\"font-weight: bold;\">Example programs:</span> Limewire, Gnutella, BearShare.</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Cloud Services</span></span>\r\nWith a cloud file sharing service, one user uploads their data to a central repository and then other users can download the files to their own devices. All data is hosted by a third party provider, although users can specify what types of permission levels to put on the files.\r\n<ul><li><span style=\"font-weight: bold;\">Great for:</span> Fast sharing of files, creating backups of data.</li><li><span style=\"font-weight: bold;\">Example programs:</span> Dropbox, Box, OneDrive, iCloud.</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Email Providers</span></span>\r\nSome people don’t realize that email can actually function as a file transfer system. Every time you attach a document to an outgoing message, you are initiating a transfer of that data over the open internet.\r\n<ul><li><span style=\"font-weight: bold;\">Great for:</span> Small files, data that need explanation.</li><li><span style=\"font-weight: bold;\">Example programs:</span> Gmail, Outlook, Yahoo! Mail.</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Removable Storage</span></span>\r\nWhen no network-based option will fulfill your needs, you can always rely on a physical drive to serve as your file transfer operation. This means you are literally copying data to a USB flash drive or external hard drive and plugging that device into the destination computer.\r\n<ul><li><span style=\"font-weight: bold;\">Great for:</span> Massive files, sensitive data.</li><li><span style=\"font-weight: bold;\">Example programs:</span> USB thumb drives or external hard drives.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/sharefiledocumentcopying-icon.png","alias":"secure-file-sharing"}},"companyUrl":"https://www.rpost.com/","countryCodes":["USA"],"certifications":[],"isSeller":true,"isSupplier":false,"isVendor":true,"presenterCodeLng":"","seo":{"title":"RPost","keywords":"","description":"RPost® is a global leader in e-signature and cybersecurity services, specializing in email encryption for privacy and compliance, e-signature automation, legal e-delivery proof, document rights management, and AI-infused services to prevent data leaks and ","og:title":"RPost","og:description":"RPost® is a global leader in e-signature and cybersecurity services, specializing in email encryption for privacy and compliance, e-signature automation, legal e-delivery proof, document rights management, and AI-infused services to prevent data leaks and ","og:image":"https://old.roi4cio.com/uploads/roi/company/1_RPost.png"},"eventUrl":"","vendorPartners":[],"supplierPartners":[],"vendoredProducts":[{"id":6259,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/RPost.jpg","logo":true,"scheme":false,"title":"RMail","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"rpost-rmail","companyTitle":"RPost","companyTypes":["vendor"],"companyId":8367,"companyAlias":"rpost","description":"<p class=\"MsoNormal\"><span lang=\"EN-US\">RMail® is the e-security platform by RPost®, a global leader for more than a decade. RMail specializes in elegantly easy to use email encryption for privacy and compliance, e-signatures, legal e-delivery proof, secure file sharing, email impostor protection, document rights management, and AI-infused services to prevent data leaks and human e-security errors.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">RMail installs into one’s existing Microsoft 365 Outlook, Gmail, Salesforce.com, or other email and business management systems.</span></strong></p>\r\n<p class=\"MsoNormal\"><em><span lang=\"EN-US\">Install an RMail App</span></em></p>\r\n<p class=\"MsoListParagraphCxSpFirst\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; mso-list: l3 level1 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">Sender Selects</span></strong><span lang=\"EN-US\">: sender clicks the RMail “Send Registered” button and selects send features.</span></p>\r\n<p class=\"MsoListParagraphCxSpLast\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; mso-list: l3 level1 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">RMail Recommends™</span></strong><span lang=\"EN-US\">: AI-infused prediction technology that, based on message criteria, automatically sensitizes senders, training them in-the-moment of sending, as to what RMail features should be applied to that message, and then sends with the recommended email protections.</span></p>\r\n<p class=\"MsoNormal\"><em><span lang=\"EN-US\">Enable the RMail Gateway</span></em></p>\r\n<p class=\"MsoListParagraph\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; mso-list: l3 level1 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">Secure Email Gateway</span></strong><span lang=\"EN-US\">: RMail Gateway is a suite of inbound email protections along with specialized outbound data leak and information protection services. Based on message metadata and administrator rules, RMail Gateway determines which messages should be sent with which added RMail features (i.e., encryption, type of encryption, certified e-delivery, for recipient e-signature, and more) and automatically sends the message in that manner, returning a certified record of e-delivery and privacy compliance for each sent message. </span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\" style=\"font-size: 14.0pt; line-height: 107%;\">RMail is best for…</span></strong></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">RMail’s transmission e-security services are most often used by businesspeople or business systems that send important, sensitive, or consumer-regulated information. These RMail services are generally applied to those messages where the sender needs functionality beyond standard email in terms of (a) easier to use and more automated email encryption for privacy compliance, (b) returning a verifiable proof record of who said what to whom by email, (c) assurance and peace of mind related to delivery and open status of important and time-deadline email, (d) need a timestamped proof of content delivered, (f) need to share large files securely, or (g) need to easily obtain a recipient e-signature on a sent document.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\" style=\"font-size: 14.0pt; line-height: 107%;\">Product Description</span></strong></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">Main RMail transmission-centric features:</span></strong></p>\r\n<p class=\"MsoListParagraphCxSpFirst\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; line-height: 106%; mso-list: l2 level1 lfo2;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">Registered Encryption™ </span></strong><span lang=\"EN-US\">email security automatically delivers email in a unique way to each recipient, creating the simplest user experience for the recipient while also returning auditable proof of privacy and compliance to the sender -- going far beyond basic TLS and link-retrieval systems. RMail includes different levels of encryption for when it is important to keep messages private from a recipient’s email administrator or other insiders.</span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 18.0pt; mso-add-space: auto;\"><span lang=\"EN-US\"> </span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; line-height: 106%; mso-list: l2 level1 lfo2;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">Registered Email™ certified e-delivery tracking and proof</span></strong><span lang=\"EN-US\"> provides email open/delivery tracking and evidence, with timestamped proof of original content legally delivered. It returns a court-accepted timestamped Registered Receipt™ email without requiring any recipient action.</span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\"><span lang=\"EN-US\"> </span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; line-height: 106%; mso-list: l2 level1 lfo2;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-bidi-font-style: italic;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-US\">Secure Large File Share</span></strong><span lang=\"EN-US\" style=\"mso-bidi-font-weight: bold;\"> -</span><span lang=\"EN-US\">- senders can easily attach and track up to 1GB of files from Outlook or the RMail Web app. Senders can send securely to any recipient with encryption and configurable self-purging options (from 1 to 90 days) in a one-time online storage box that eliminates the risk of download recipients being able to see sender’s cloud storage file structure. </span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\"><em><span lang=\"EN-US\"> </span></em></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; line-height: 106%; mso-list: l2 level1 lfo2;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">RMail E-Sign and RSign </span></strong><span lang=\"EN-US\">are the simplest, most affordable full featured web-based electronic signature services. RSign makes it easy for signers to complete and sign documents using any desktop or mobile web browser in an intuitive, guided signing process. </span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\"><em><span lang=\"EN-US\"> </span></em></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; line-height: 106%; mso-list: l2 level1 lfo2;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-bidi-font-style: italic;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-US\">Disappearing Ink™</span></strong><span lang=\"EN-US\" style=\"mso-bidi-font-weight: bold;\"> and </span><strong style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-US\">ViewProof™</span></strong><span lang=\"EN-US\"> -- senders can tag certain parts of an email message to disappear from within the email after delivery after a designated amount to time since sending, number of views, or time per view. Senders can receive verifiable proof that the recipient has viewed selected tagged parts of an email.</span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\"><em><span lang=\"EN-US\"> </span></em></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; line-height: 106%; mso-list: l2 level1 lfo2;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong style=\"mso-bidi-font-weight: normal;\"><span lang=\"EN-US\">Redact Reply™</span></strong> <span lang=\"EN-US\">– senders can redact particularly sensitive text in a sent message such that if the recipient replies, that sensitive text is automatically removed from the reply email thread.</span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\"><em><span lang=\"EN-US\"> </span></em></p>\r\n<p class=\"MsoListParagraphCxSpLast\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; line-height: 106%; mso-list: l1 level1 lfo3;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">SideNote® </span></strong><span lang=\"EN-US\">service – makes it easy to append a private “sticky note” to a copied or blind copied recipient, so they have context as to why they were copied, and with Disappearing Ink™ enabled, that note can be set for one-time-view and to disappear from the recipient inbox after.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">Main RMail application-centric features:</span></strong></p>\r\n<p class=\"MsoListParagraphCxSpFirst\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; line-height: 106%; mso-list: l0 level1 lfo4;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">RMail Recommends™ </span></strong><span lang=\"EN-US\">AI-infused data leak protection -- automatically trains senders on which messages should be treated with special care, and have special RMail features applied, in-the-moment of sending. Dynamically adapts to prevent data leaks and automate email encryption. </span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 18.0pt; mso-add-space: auto;\"><span lang=\"EN-US\"> </span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; line-height: 106%; mso-list: l0 level1 lfo4;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">Right Recipient</span></strong><span lang=\"EN-US\">™ data shield – dynamically adapting service that, if a message is detected to contain sensitive content, automatically reviews the recipient addresses before transmission, determines if the sender should be prompted to verify that they really want to send sensitive information to the particular recipients, and then applies the appropriate level of encryption to the message enroute if sent.</span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\"><strong><span lang=\"EN-US\"> </span></strong></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; line-height: 106%; mso-list: l0 level1 lfo4;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">Anti-Whaling™ email impostor protection</span></strong><span lang=\"EN-US\"> – RMail for Outlook includes patent pending Anti-Whaling technology that prevents targeted ‘spear-phishing’ detection specifically designed to prevent Business Email Compromise and CEO Fraud impostor email and other lures. </span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\"><strong><span lang=\"EN-US\"> </span></strong></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; line-height: 106%; mso-list: l0 level1 lfo4;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">RMail Wire Fraud Protection™</span></strong><span lang=\"EN-US\"> is a specialized service to assure the right message is sent to the right recipient, with options to apply message-level encryption automatically if the message is related to bill payments, invoices, or wire transfers.</span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\"><span lang=\"EN-US\"> </span></p>\r\n<p class=\"MsoListParagraphCxSpLast\" style=\"margin-left: 18.0pt; mso-add-space: auto; text-indent: -18.0pt; line-height: 106%; mso-list: l0 level1 lfo4;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">RMail Protected Documents™</span></strong><span lang=\"EN-US\"> is a specialized document encryption service that makes it easy for senders to apply protections to any document that live within the document itself, so the sender may at any time after transmission, track views, restrict to certain verified viewers, restrict functionality on the document (edit, print, watermark), or kill the document so that it can no longer be viewed by certain or anyone after a time period.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\" style=\"font-size: 14.0pt; line-height: 107%;\">Deployment Options</span></strong></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">RMail offers options for deployment including:</span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">(a) <strong>secure email gateway</strong> product for inbound and outbound email security automation running at the email perimeter, as well as its </span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">(b) <strong>email security app</strong> for specialized email security needs, running installed in the sender’s email program, and </span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">(c) <strong>message-and-document-level data protection</strong> that embeds access rights management, information blocking and retrieval, and other security into parts of email messages and onto documents whether or not the document is attached to an email or otherwise shared (adds encryption to track and prevent unauthorized access to email content before or after it has been sent and additionally helps prevent accidental data loss due to misdirecting email to the wrong recipients).<span style=\"mso-tab-count: 1;\"> </span></span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">As an additional benefit, the <strong>RMail email security app is AI-infused</strong> to provide automated “in-the-moment” security training and user sensitization, with dynamically adapting recommendations to apply certain security features to a particular message or behind-the-scenes automatically applying certain features.</span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Generally, these are deployed individually or combined; or complementing other third-party inbound security services.</span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">(a) RMail secure email gateway is a perimeter email security service offering (standalone only for inbound, or outbound, or both). Some implement our outbound services only while maintaining other (existing) inbound service so we can complement; or</span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">(b) RMail email security app is a client-based plug-in (which includes very specific inbound protections (not to replace other inbound, but to complement) plus very robust outbound (including AI security automation, etc.); or further, </span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">(c) RMail may be deployed with both RMail Gateway secure email gateway and RMail secure email app client-based plug-in; and</span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">(d) RMail message-and-document-level data protection may be automated within the RMail Gateway secure email gateway and RMail secure email app and/or accessed separately though the RMail web app.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\" style=\"font-size: 16.0pt; line-height: 107%;\">RMail Pricing</span></strong></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">RMail Free</span></strong><span lang=\"EN-US\"> is a free ongoing base level of service for periodic use. Cost: $0</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">RMail 365</span></strong><span lang=\"EN-US\"> includes all main service features for basic users. Cost: $7 per user per month.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">RMail Standard</span></strong><span lang=\"EN-US\"> includes all main service features, designed for standard business needs. Cost: $15 per user per month.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\" style=\"font-size: 16.0pt; line-height: 107%;\">RMail Price Overview</span></strong></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">Per User Plans:</span></strong><span lang=\"EN-US\"> RMail license for main features on a per user basis. </span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">Shared Volume Plans:</span></strong><span lang=\"EN-US\"> RMail license for a designated volume of messages shared among a designated group of senders, automated system senders, or API automated sending.</span></p>","shortDescription":"RMail® is the e-security platform by RPost®","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"RMail","keywords":"","description":"<p class=\"MsoNormal\"><span lang=\"EN-US\">RMail® is the e-security platform by RPost®, a global leader for more than a decade. RMail specializes in elegantly easy to use email encryption for privacy and compliance, e-signatures, legal e-delivery proof, s","og:title":"RMail","og:description":"<p class=\"MsoNormal\"><span lang=\"EN-US\">RMail® is the e-security platform by RPost®, a global leader for more than a decade. RMail specializes in elegantly easy to use email encryption for privacy and compliance, e-signatures, legal e-delivery proof, s","og:image":"https://old.roi4cio.com/fileadmin/user_upload/RPost.jpg"},"eventUrl":"","translationId":6258,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":483,"title":"Messaging Security","alias":"messaging-security","description":"<span style=\"font-weight: bold; \">Messaging security</span> is a subcategory of <span style=\"font-style: italic; \">unified threat management (UTM) </span>focused on securing and protecting an organization’s communication infrastructure. Communication channels can include email software, messaging apps, and social network IM platforms. This extra layer of security can help secure devices and block a wider range of viruses or malware attacks.\r\nMessaging security helps to ensure the confidentiality and authenticity of an organization’s communication methods. Confidentiality refers to making sure only the intended recipients are able to read the messages and authenticity refers to making sure the identity of each sender or recipient is verified.\r\nOftentimes, attackers aim to gain access to an entire network or system by infiltrating the messaging infrastructure. Implementing proper data and message security can minimize the chance of data leaks and identity theft.\r\n<span style=\"color: rgb(97, 97, 97); \">Encrypted messaging (also known as secure messaging) provides end-to-end encryption for user-to-user text messaging. Encrypted messaging prevents anyone from monitoring text conversations. Many encrypted messenger apps also offer end-to-end encryption for phone calls made using the apps, as well as for files that are sent using the apps.</span>\r\nTwo modern methods of encryption are the <span style=\"font-style: italic; \">Public Key (Asymmetric)</span> and the <span style=\"font-style: italic; \">Private Key (Symmetric</span>) methods. While these two methods of encryption are similar in that they both allow users to encrypt data to hide it from the prying eyes of outsiders and then decrypt it for viewing by an authorized party, they differ in how they perform the steps involved in the process.\r\n<span style=\"font-weight: bold; \">Email</span> security message can rely on public-key cryptography, in which users can each publish a public key that others can use to encrypt messages to them, while keeping secret a private key they can use to decrypt such messages or to digitally encrypt and sign messages they send. \r\n<span style=\"font-weight: bold;\">Encrypted messaging systems </span>must be encrypted end-to-end, so that even the service provider and its staff are unable to decipher what’s in your communications. Ideal solutions is “server-less” encrypted chat where companies won’t store user information anywhere.\r\nIn a more general sense, users of unsecured public Wi-Fi should also consider using a <span style=\"font-weight: bold;\">Virtual Private Network </span>(VPN) application, to conceal their identity and location from Internet Service Providers (ISPs), higher level surveillance, and the attentions of hackers.","materialsDescription":"<h1 class=\"align-center\"> What is messaging security?</h1>\r\nMessaging Security is a program that provides protection for companies' messaging infrastructure. The programs include IP reputation-based anti-spam, pattern-based anti-spam, administrator-defined block/allow lists, mail antivirus, zero-hour malware detection, and email intrusion prevention.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Six Dimensions of Comprehensive Messaging Security</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">IP-Reputation Anti-spam.</span> It checks each email connection request with a database of IP addresses to establish whether a sender is a legitimate or known spam sender and malware. If a sender is recognized it undesirable the messaging Security program drops the connection before the message is accepted.</li><li><span style=\"font-weight: bold; \">Pattern-based anti-spam</span> utilizes a proprietary algorithm to establish a fingerprint-like signature of email messages. When a message comes in, its pattern is calculated and checked against a database to determine if the message matches a known email pattern. </li><li><span style=\"font-weight: bold; \">Block/Allow List Anti-spam.</span> Administrators can create a list of IP addresses or domains that they would like to either block or allow. This method ensures that trusted sources are explicitly allowed and unwanted sources are explicitly denied access.</li><li><span style=\"font-weight: bold; \">Mail Antivirus.</span> This layer of protection blocks a wide range of known viruses and malware attacks.</li><li><span style=\"font-weight: bold; \">Zero-Hour Malware Protection.</span> By analyzing large numbers of messages, outbreaks are detected along with their corresponding messages. These message patterns are then flagged as malicious, giving information about a given attack.</li><li><span style=\"font-weight: bold; \">SmartDefense Email IPS.</span> The messaging security program utilizes SmartDefense Email IPS to stop attacks targeting the messaging infrastructure. </li></ul>\r\n<h1 class=\"align-center\">What are Signal, Wire and LINE messenger security apps like ?</h1>\r\n<p class=\"align-left\">Secure private messenger is a messaging application that emphasizes the privacy and of users using encryption and service transparency. While every modern messenger system is using different security practices (most prominently SSL/HTTPS) - the difference between secure and classic messengers is what we don’t know in the scope of implementation and approach to user data. </p>\r\n<p class=\"align-left\">Message access control and secure messengers evolved into a distinct category due to the growing awareness that communication over the internet is accessible by third parties, and reasonable concerns that the messages can be used against the users.</p>\r\n<h1 class=\"align-center\">Why secure communication is essential for business?</h1>\r\n<p class=\"align-left\">In the context of business operation, communication is a vital element of maintaining an efficient and dynamic working process. It lets you keep everything up to date and on the same page. And since many things are going on at the same time - tools like messengers are one of the many helpers that make the working day a little more manageable.</p>\r\n<p class=\"align-left\">Some of the information, like employee and customer data, proprietary information, data directly linked to business performance or future projections, may be strictly under a non-disclosure agreement. Without proper text message authentication in information security or encryption, it remains vulnerable to exposure. The chances are slim, but the possibility remains. </p>\r\n<p class=\"align-left\">And there are people interested in acquiring that sensitive information, people who like to play dirty because getting a competitive advantage is a decent motivation to go beyond the law. And when private conversations leak, especially the business-related ones - the impact is comparable with the Titanic hitting an iceberg. </p>\r\n<p class=\"align-left\">Encrypted massages in messenger prevents this from happening.</p>\r\n<p class=\"align-left\"> </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Messaging_Security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":6849,"logoURL":"https://old.roi4cio.com/fileadmin/content/9._RSign.png","logo":true,"scheme":false,"title":"RSign","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"rsign","companyTitle":"RPost","companyTypes":["vendor"],"companyId":8367,"companyAlias":"rpost","description":"<p class=\"MsoNormal\"><span lang=\"EN-US\">RSign® is the e-signature platform by RPost®, a global leader for more than a decade. RSign® combines feature-richness with elegantly easy to use and affordability at scale. Unique to RSign is its ability to make common e-signing simple and automated, while meeting all of your document, form, or workflow scenarios.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">RSign specializes in:</span></strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 18.0pt;\"><strong><span lang=\"EN-US\">E-Signatures Made Easy. </span></strong><span lang=\"EN-US\">Easier e-sign experience for both sender and signer.</span></p>\r\n<p class=\"MsoListParagraph\" style=\"margin-left: 54.0pt; mso-add-space: auto; text-indent: -18.0pt; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><span lang=\"EN-US\">RSign makes the signing process simple and easy for signers to complete and sign documents using any desktop or mobile web browser in a guided process of signing. RSign comes with a simpler user design, customizable user interface, sharable templates, real time reporting, and more. </span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 18.0pt;\"><strong><span lang=\"EN-US\">Signature Certificate with Forensic Audit Trail.</span></strong><span lang=\"EN-US\"> Records with the authenticatable audit trail.</span></p>\r\n<p class=\"MsoListParagraph\" style=\"margin-left: 54.0pt; mso-add-space: auto; text-indent: -18.0pt; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><span lang=\"EN-US\">RSign® patents provide the most robust authenticatable audit trail embedded in the e-sign record. RSign delivers a Signature Certificate which can serve as a forensic record and can self-authenticate, providing all transmission tracking, content, and timestamps irrespective of recipient systems. The Signature Certificate, an evidence format that is recognized around the globe, may be appended to the agreement that is signed or separately, and it may be imported into systems using the RSign APIs.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 18.0pt;\"><strong><span lang=\"EN-US\">Privacy with Encryption and RSign Inbox.</span></strong><span lang=\"EN-US\"> E-Signatures that comply with HIPAA and GDPR regulations.<span style=\"mso-spacerun: yes;\"> </span></span></p>\r\n<p class=\"MsoListParagraph\" style=\"margin-left: 54.0pt; mso-add-space: auto; text-indent: -18.0pt; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><span lang=\"EN-US\">RSign® comes with many levels of security to select from; encrypt the transmission to the recipient and return the signed agreements and forms encrypted, manage decryption password settings, build unique access codes for multi-factor signer authentication. </span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 18.0pt;\"><strong><span lang=\"EN-US\">Enterprise-Grade Features at Affordable Cost. </span></strong><span lang=\"EN-US\">All possible workflow settings simply included.</span></p>\r\n<p class=\"MsoListParagraph\" style=\"margin-left: 54.0pt; mso-add-space: auto; text-indent: -18.0pt; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><span lang=\"EN-US\">RSign includes enterprise-grade features at an affordable cost; which is normally, half the cost of other full-service providers. RSign comes with all the functionality that you need at a lower cost and with a friendly customer service. </span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 18.0pt;\"><strong><span lang=\"EN-US\">Automation with Experts to Guide the Way.</span></strong><span lang=\"EN-US\"> Rated “most helpful”; experts you will enjoy working with.</span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">RSign® makes it easy to automate. Many customers select RSign after analyzing the marketplace and realizing RSign teams are the most flexible, accommodating and knowledgeable.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">RSign solves common business challenges:</span></strong></p>\r\n<p class=\"MsoListParagraphCxSpFirst\" style=\"text-indent: -18.0pt; line-height: 106%; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">Businesses need to obtain recipient signature on sent agreements in a simple, intuitive, fast, and paperless process</span></strong><span lang=\"EN-US\">; one that returns a uniform robust e-record of a signoff. Sending attached to standard email is cumbersome for the recipient. Paper is slow and costly. Fax is often inconvenient.</span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-indent: -18.0pt; line-height: 106%; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">Businesses need a uniform, trusted record of electronic signoff; one that can be relied upon as strong evidence should there be a dispute in the future. </span></strong><span lang=\"EN-US\">The e-record must be legally binding and in a uniform format that they can trust without evaluating the evidential weight of each signoff record.</span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-indent: -18.0pt; line-height: 106%; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">Many agreements and forms contain sensitive terms, pricing, financial, private consumer, or health information </span></strong><span lang=\"EN-US\">- information that often must remain private. Sending by standard email and receiving signoff by fax is often not private. The sending, filling, and returned record needs privacy options.</span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-indent: -18.0pt; line-height: 106%; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">Businesses need expansive features in an enterprise-grade e-signature service at affordable cost, as they expand use across their organization and volumes increase. </span></strong><span lang=\"EN-US\">Businesses can generate more efficiencies with e-signatures if the costs are affordable and predictable.</span></p>\r\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-indent: -18.0pt; line-height: 106%; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-bidi-font-weight: bold;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">Digitizing workflows with e-signatures and forms requires deep knowledge of the business processes needing modernization matched with the art-of-the-possible with e-signature services. </span></strong><span lang=\"EN-US\">Innovation staff need a trusted partner to collaborate with and to adapt e-sign services to specific processes.</span></p>\r\n<p class=\"MsoListParagraphCxSpLast\" style=\"text-indent: -18.0pt; line-height: 106%; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">Businesses need to automate processes</span></strong><span lang=\"EN-US\">; automate pre-filling forms with some data, sending for signoff, tracking responses, obtaining the signoff record, and at times, back-filling completed form data into sender systems. Automation maximizes efficiency, controls, and reduces cost and risk.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">RSign main benefits:<span style=\"mso-spacerun: yes;\"> </span></span></strong></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 18.0pt;\"><strong><span lang=\"EN-US\">E-Sign Simple Enough that People Actually Enjoy Using. Plus, all the features you will ever need.</span></strong></p>\r\n<p class=\"MsoListParagraph\" style=\"text-indent: -18.0pt; line-height: 106%; mso-list: l1 level1 lfo2;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">RSign® makes e-signatures so simple for all staff, that it encourages use.</span></strong><span lang=\"EN-US\"> More use means more cost savings, administrative time savings, and faster business. RSign includes all the enterprise-grade features and training you will ever need.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 18.0pt;\"><strong><span lang=\"EN-US\">Legal and Auditable Proof. Assurance, confidence, and peace of mind.</span></strong></p>\r\n<p class=\"MsoListParagraph\" style=\"text-indent: -18.0pt; line-height: 106%; mso-list: l1 level1 lfo2;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-bidi-font-weight: bold;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">RSign® makes it easy to view and rely on the Signature Certificate for e-sign tracking, a forensic audit trail, and sent and signed content and timestamp information.</span></strong><span lang=\"EN-US\"> A robust record of who signed what when provides confidence that the e-sign process and record will stand up to scrutiny if ever challenged in the future. Legal Proof®.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 18.0pt;\"><strong><span lang=\"EN-US\">Private and Secure. Security and authentication for privacy and industry compliance.</span></strong></p>\r\n<p class=\"MsoListParagraph\" style=\"text-indent: -18.0pt; line-height: 106%; mso-list: l1 level1 lfo2;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-bidi-font-weight: bold;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">RSign makes e-signing private so that senders can enjoy the benefits of e-signatures even when private transaction data, strategic, health, or protected consumer information is in the agreements or forms. </span></strong><span lang=\"EN-US\">RSign includes a variety of security, authentication, and privacy options to fit any sensitive e-sign situation.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 18.0pt;\"><strong><span lang=\"EN-US\">Enterprise Grade and Affordable. RSign is affordable and maximizes cost and time savings.</span></strong></p>\r\n<p class=\"MsoListParagraph\" style=\"text-indent: -18.0pt; line-height: 106%; mso-list: l1 level1 lfo2;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">RSign provides all the enterprise-grade features in an easy-to-afford offering, making it cost effective to convert almost any document to e-signatures, digital forms, and modernized workflows.</span></strong><span lang=\"EN-US\"> Businesses enjoy more cost savings with less paper, mail, postage, administrative time, and a low e-sign service cost. Unlike other providers, RSign also offers automatic renewals with fixed rates that do not increase annually.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 18.0pt;\"><strong><span lang=\"EN-US\">Optimize with Ease. Experts help you automate and digitize more.</span></strong></p>\r\n<p class=\"MsoListParagraph\" style=\"text-indent: -18.0pt; line-height: 106%; mso-list: l1 level1 lfo2;\"><!-- [if !supportLists]--><span lang=\"EN-US\" style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol; mso-bidi-font-weight: bold;\"><span style=\"mso-list: Ignore;\">·<span style=\"font: 7.0pt 'Times New Roman';\"> </span></span></span><!--[endif]--><strong><span lang=\"EN-US\">RSign® makes e-signature and digital form automation easy, with expert staff to guide at every step. </span></strong><span lang=\"EN-US\">Many customers choose RSign after reviewing the marketplace and realizing RSign teams are the most accommodating, flexible, and knowledgeable so as to ease the burden of automating and digitizing complex processes. RSign staff have been rated by customers as the “most helpful” experts customers enjoyed working with. </span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">Top 5 Reasons Businesses Choose RSign</span></strong></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">1. RSign is Feature-Rich</span></strong></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">An important step in selecting an electronic signature solution is to categorize your use cases in terms of, for example, quick send for e-signature, sending re-usable forms for fill-and-sign, sending the same document with different pre-filled data for fill-and-sign (whether these are humans sending one-off or automated sending from a system) and more.</span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">RSign provides the feature-richness to make the e-sign experience work well depending on whether you need a quick ad-hoc e-signature or if there’s a complex form with lots of dependencies. Plus, features that address various security, privacy, compliance, and automation needs depending on the use case.</span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Feature-richness is most important because, if the process or workflow cannot be accomplished elegantly, the rest hardly matters.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">2. RSign is Elegantly Easy</span></strong></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">E-Signatures often require a change in human behavior (for senders and/or recipients). Having an elegantly easy solution (due to the wide range of automation features and settings available as per above) makes it easier for admins, senders, and signers to buy into the process change.</span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Plus, if you are looking to switch providers to enjoy more affordability (see below), an elegantly easy user experience makes it additionally easy to get praise for the selecting (a much more affordable) e-sign experience in RSign.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">3. RSign is More Affordable at Scale</span></strong></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">When you start with e-signatures, volumes of sends and/or number of users may be small. As more business areas buy-in and more documents and processes are digitized, what may have been a smart initial service provider choice may not be for the future as you scale. What users today are looking for is that service provider that will remain (much) more affordable as users and volume scale, and as advanced feature-needs become more in vogue across the organization. This is RSign.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">4. RSign is Friendlier to Work With</span></strong></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">E-Signatures are really about modernizing and digitizing documents, user interactions, customer and supplier interactions, employee interactions, and more. Each type of interaction and each type of document or workflow may be better served by unique settings, features, branding, and more. A service provider who is humanly (vs. form or bot) friendly to work with will make it seamless and realistic to be able to maximize e-signature benefits now and far into the future. What you’ll need is expert guidance provided by people who care about your experience and ability to optimize usage. Think RSign.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">5. RSign Continuously Innovates</span></strong></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">You will want to find a service provider who is uniquely focused on e-signatures (versus a service provider that is part of a private equity-acquisition roll-up or something similar) and with a commitment to continuous innovation in the field. You’ll want to see your supplier not only thinking about the art of the possible, but commercializing the possible for you. This is RSign.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">6. Comfort with Security/Legalities</span></strong></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">As you start to send more sensitive, regulated private content, or work within certain privacy or legal-compliant frameworks, having a provider that specializes in privacy and legalities will permit you to move more to e-signature and digital forms process in more areas of your business, safely. RSign provides the most robust legal e-sign record.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\" style=\"font-size: 16.0pt; line-height: 107%;\">Target Markets</span></strong></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">RSign is applicable to businesses of all sizes in all industries. Functionally, RSign is most often uses among customer service and sales, human resources, and corporate contracts staff</span></p>\r\n<p class=\"MsoNormal\"><span lang=\"EN-US\">While RSign is most popular in the insurance, health care, life sciences, financial services, legal, real estate, manufacturing and government sectors, RSign is used across all industries.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\" style=\"font-size: 16.0pt; line-height: 107%;\">RSign Pricing</span></strong></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">RSign Free</span></strong><span lang=\"EN-US\"> is a free ongoing base level of service for periodic use. Cost: $0</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">RSign 365</span></strong><span lang=\"EN-US\"> includes all main service features for basic users. Cost: $7 per user per month.</span></p>\r\n<p class=\"MsoNormal\"><strong><span lang=\"EN-US\">RSign Standard</span></strong><span lang=\"EN-US\"> includes all main service features, designed for standard business needs. Cost: $15 per user per month.</span></p>","shortDescription":"RSign® is the e-signature platform by RPost®.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"RSign","keywords":"","description":"<p class=\"MsoNormal\"><span lang=\"EN-US\">RSign® is the e-signature platform by RPost®, a global leader for more than a decade. RSign® combines feature-richness with elegantly easy to use and affordability at scale. Unique to RSign is its ability to ","og:title":"RSign","og:description":"<p class=\"MsoNormal\"><span lang=\"EN-US\">RSign® is the e-signature platform by RPost®, a global leader for more than a decade. RSign® combines feature-richness with elegantly easy to use and affordability at scale. Unique to RSign is its ability to ","og:image":"https://old.roi4cio.com/fileadmin/content/9._RSign.png"},"eventUrl":"","translationId":6849,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":32,"title":"IT outsourcing","alias":"it-outsourcing","description":"<span style=\"font-weight: bold; \">IT outsourcing</span> is the use of external service providers to effectively deliver IT-enabled business process, application service and infrastructure solutions for business outcomes.\r\nOutsourcing, which also includes utility services, software as a service and cloud-enabled outsourcing, helps clients to develop the right sourcing strategies and vision, select the right IT service providers, structure the best possible contracts, and govern deals for sustainable win-win relationships with external providers.\r\nOutsourcing can enable enterprises to reduce costs, accelerate time to market, and take advantage of external expertise, assets and/or intellectual property. IT outsourcing can be implemented both ways: outsides or within the country. \r\nIT outsourcing vendors can provide either a fully managed service, meaning they take full responsibility of all IT maintenance and support, or they can provide additional support for an internal IT team when needed, which is known as co-sourced IT support. A company using IT outsourcing can choose to use one provider for all their IT functions or split the work among multiple providers. \r\n<span style=\"font-weight: bold;\">Specific IT services typically outsourced include:</span>\r\n<ul><li>Application development</li><li>Web hosting</li><li>Application support</li><li>Database development</li><li>Telecommunications</li><li>Networking</li><li>Disaster recovery</li><li>Security</li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Reasons for Outsourcing</span></p>\r\n<span style=\"font-weight: bold; \">To Reduce Cost.</span> More often than not, outsourcing means saving money. This is often due to lower labor costs, cheaper infrastructure, or an advantageous tax system in the outsourcing location.<br /><span style=\"font-weight: bold; \">To Access Skills That Are Unavailable Locally.</span> Resources that are scarce at home can sometimes be found in abundance elsewhere, meaning you can easily reach them through outsourcing.<br /><span style=\"font-weight: bold; \">To Better Use Internal Resources</span>. By delegating some of your business processes to a third party, you’ll give your in-house employees the opportunity to focus on more meaningful tasks.<br /><span style=\"font-weight: bold; \">To Accelerate Business Processes.</span> When you stop wasting time on mundane, time-consuming processes, you’ll be able to move forward with your core offering a lot faster.<br /><span style=\"font-weight: bold; \">To Share Risks.</span> When you delegate a part of non-focus functionality by outsourcing it to a third-party vendor, you give away the responsibility and related risks.","materialsDescription":"<h3 class=\"align-center\">What are the Types of IT Outsourcing?</h3>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Project-Based Model.</span> The client hires a team to implement the part of work that is already planned and defined. The project manager from the outsourced team carries full responsibility for the quality and performance of the project.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Dedicated Team Model.</span> The client hires a team that will create a project for them, and they will work only on that project. Unlike the project-based model, a dedicated team is more engaged in your project. In this model, an outsourced team becomes your technical and product advisor. So it can offer ideas and suggest alternative solutions.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Outstaff Model.</span> It's a type of outsourcing in IT when you don't need a full-fledged development team and hire separate specialists. Sometimes the project requires finding a couple of additional professionals, and you're free to hire outstaff workers to cover that scope of work.</p>\r\n<h3 class=\"align-center\"><span style=\"font-weight: bold; \">What are IT Outsourcing examples?</span></h3>\r\nThe individual or company that becomes your outsourcing partner can be located anywhere in the world — one block away from your office or on another continent.\r\nA Bay Area-based startup partnering with an app development team in Utah and a call center in the Philippines, or a UK-based digital marketing agency hiring a Magento developer from Ukraine are both examples of outsourcing.\r\n<h3 class=\"align-center\">Why You Should Use IT Outsourcing</h3>\r\nNow that you know what IT outsourcing is, its models, and types, it's time to clarify why you need to outsource and whether you really need it. Let's go over a few situations that suggest when to opt for IT outsourcing.\r\n<ul><li><span style=\"font-weight: bold;\">You are a domain expert with idea</span></li></ul>\r\nIf you're an industry expert with the idea that solves a real problem, IT outsourcing is your choice. In this case, your main goal is to enter the market and test the solution fast. An outsourced team will help you validate the idea, build an MVP to check the hypothesis, and implement changes in your product according to market needs. It saves you money, time and lets you reach the goal.\r\n<ul><li><span style=\"font-weight: bold;\">You have an early-stage startup</span></li></ul>\r\nIt's a common case that young startups spend money faster than they get a solid team and a ready-to-market product. The Failory found that financial problems are the 3rd reason why startup fails. So it makes more sense to reduce costs by hiring an outsourced team of professionals while your business lives on investor's money. You may employ a full-cycle product development studio covering all the blind spots and bringing your product to life.\r\n<ul><li><span style=\"font-weight: bold;\">You need a technical support</span></li></ul>\r\nEven if you already have a ready solution, but it demands some technical improvements – frameworks for backend components, new language, integrations with enterprise software, UX&UI design – it makes more sense to find an experienced partner. There are many functions that IT outsourcing can cover, and again it saves you the time you'd otherwise spend on looking for qualified staff.<br /><br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IT_outsourcing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"suppliedProducts":[],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}