{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"comparison":{"compare":{"ru":"Сравнить","_type":"localeString","en":"Compare"},"characteristics":{"ru":"Характеристики","_type":"localeString","en":"Characteristics"},"additional_template":{"_type":"localeString","en":"Additional characteristics","ru":"Дополнительные характеристики"},"nothing_to_show":{"_type":"localeString","en":"No data to compare","ru":"Нет данных для отображения"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"en":"Sign out","ru":"Выйти","_type":"localeString"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"_type":"localeString","en":"Bonus for reference","ru":"Бонус за референс"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"_type":"localeString","en":"Blog","ru":"Блог"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"en":"My profile","ru":"Мои данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"ru":"Инфоцентр","_type":"localeString","en":"Infocenter","de":"Infocenter"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"_type":"localeString","en":"Registration","ru":"Регистрация"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"en":"Received ROI","ru":"Полученный ROI","_type":"localeString"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"comparison":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"comparison":{"title":{"_type":"localeString","en":"Compare products","ru":"Сравнить продукты"}}},"pageMetaDataStatus":{"comparison":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"46":{"id":46,"title":"IAM - Identity and Access Management","characteristics":[{"id":683,"title":"Access Management","required":0,"type":"binary"},{"id":685,"title":"Account Management","required":0,"type":"binary"},{"id":687,"title":"Multifactor Authentication","required":0,"type":"binary"},{"id":689,"title":"Password Management","required":0,"type":"select"},{"id":689,"title":"Password Management","required":0,"type":"select"},{"id":692,"title":"User Activity Monitoring","required":0,"type":"select"},{"id":694,"title":"User Provisioning","required":0,"type":"binary"},{"id":696,"title":"Single Sign On","required":0,"type":"select"},{"id":698,"title":"Role Management","required":0,"type":"select"},{"id":700,"title":"Enterprise Mobility Management","required":0,"type":"select"},{"id":702,"title":"Directory Management","required":0,"type":"select"},{"id":704,"title":"Cloud Service","required":0,"type":"binary"},{"id":706,"title":"Privileged Account Management","required":0,"type":"select"},{"id":708,"title":"Бесплатный пробный период","required":0,"type":"select"}]}},"comparisonByTemplateId":{},"products":[{"id":1946,"logoURL":"https://old.b4r.io/fileadmin/user_upload/CA_Technologies2.png","logo":true,"scheme":false,"title":"Broadcom (CA) Identity and Access Management","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"broadcom-ca-identity-and-access-management","companyTypes":[],"description":"Modern Identity and Access Management How can organizations secure the user journey in a digital world where many of the traditional defensive layers are no longer present? Users and applications are the point of attack and the security of digital relationships becomes a question of trust. You need to strengthen your digital relationships by seamlessly connecting trusted users to trusted applications, all while preventing fraudulent access and session hijacking. Trusted identities are the foundation of identity and access management, offering a seamless digital experience that makes it easy for you to do business with the enhanced security that your customers, employees and partners expect. <span style=\"font-weight: bold;\">Modern Identity and Access Management Solutions</span> <span style=\"font-weight: bold;\">Authentication</span>\r\n<ul> <li>Deliver trusted access between users and applications through continuous and context-based authentication</li> <li>Detect user, network and device risk automatically and transparently</li> <li>Make risk-adjusted access decisions only when needed and with minimal friction to the user</li> </ul>\r\n<span style=\"font-weight: bold;\">Single Sign-On</span>\r\n<ul> <li>Enable trusted users with seamless cross-application access</li> <li>Simplify access across cloud, mobile, Web applications and use of identity federation standards from any device</li> <li>Prevent account takeover with the most advanced session assurance on the market</li> </ul>\r\n<span style=\"font-weight: bold;\">Identity Management and Governance</span>\r\n<ul> <li>Grant trusted users access to on-premises and cloud applications with broad provisioning</li> <li>Increase audit and compliance efficiency by streamlining governance campaigns</li> <li>Manage identity with consumer-grade scalability and real-time policy enforcement and entitlement analysis</li> </ul>\r\n<span style=\"font-weight: bold;\">Directory Services</span>\r\n<ul> <li>Connect trusted users to trusted applications faster, to deliver the experience your users expect</li> <li>Provide a highly-responsive and always-available application experience with fewer resources</li> <li>Achieve superior scalability, reliability and an 84% higher overall performance than the competition</li> </ul>\r\n<span style=\"font-weight: bold;\">Benefits</span> Mitigate Security Risks We ensure only the right users have the right access by continuously monitoring access activity, analyzing the relationship between your users and applications and implementing adaptive security controls when user behavior patterns deviate from the normal for billions of online transaction and authentication requests each month, in any access environment—on-premises, cloud or hybrid. Transform Your Business Your users expect to seamlessly interact with your business, wherever they may be. We deliver identity and access management coupled with analytics that enable you to digitally transform while keeping your business secure. We manage and monitor users at scale and mitigate risks with context-driven security that doesn’t interfere with the experience, so you can focus on digitally interacting with your users in new ways to drive growth. Build Trusted Identities You won’t do business with an organization you don’t trust. We build trusted identities to build the trust in your digital relationships. We detect user, network and device risk automatically and transparently, so you know exactly what user is doing what, making it easy for your trusted users to do business with you, so you can keep doing business. Why CA for modern identity and access management? Our modern identity and access management portfolio incorporates authentication, single sign-on, identity provisioning and governance and directory solutions into a comprehensive suite for managing identity and access. The technologies can be configured in a variety of flexible deployment models to solve a wide range of customer use cases and can scale to meet the needs of the most large and demanding customers. We can aggregate and correlate identity and access rights across a wide range of systems including on-premises applications, cloud applications and privileged user identities to create trusted identities and build trust in your digital relationships.","shortDescription":"Broadcom (CA)\tIdentity and Access Management is a modern solution that builds trusted identities like the foundation of identity and access management, offering a seamless digital experience","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Broadcom (CA) Identity and Access Management","keywords":"access, with, users, trusted, your, identity, applications, user","description":"Modern Identity and Access Management How can organizations secure the user journey in a digital world where many of the traditional defensive layers are no","og:title":"Broadcom (CA) Identity and Access Management","og:description":"Modern Identity and Access Management How can organizations secure the user journey in a digital world where many of the traditional defensive layers are no","og:image":"https://old.b4r.io/fileadmin/user_upload/CA_Technologies2.png"},"eventUrl":"","translationId":1947,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"46":{"683":{"id":3288,"characteristicId":683,"templateId":46,"value":true},"685":{"id":3289,"characteristicId":685,"templateId":46,"value":true},"687":{"id":3290,"characteristicId":687,"templateId":46,"value":true},"689":{"id":3291,"characteristicId":689,"templateId":46,"value":"No"},"692":{"id":3292,"characteristicId":692,"templateId":46,"value":"Partially"},"694":{"id":3293,"characteristicId":694,"templateId":46,"value":true},"696":{"id":3294,"characteristicId":696,"templateId":46,"value":"Yes"},"698":{"id":3295,"characteristicId":698,"templateId":46,"value":"Yes"},"700":{"id":3296,"characteristicId":700,"templateId":46,"value":"Partially"},"702":{"id":3297,"characteristicId":702,"templateId":46,"value":"Yes"},"704":{"id":3298,"characteristicId":704,"templateId":46,"value":true},"706":{"id":3299,"characteristicId":706,"templateId":46,"value":"Yes"},"708":{"id":3300,"characteristicId":708,"templateId":46,"value":"N/A"}}}},{"id":645,"logoURL":"https://old.b4r.io/fileadmin/user_upload/IBM_LOGO.png","logo":true,"scheme":false,"title":"IBM Security Identity Manager","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"alias":"ibm-security-identity-manager","companyTypes":[],"description":"Integration with other IBM Security products, such as IBM Security Identity Governance, IBM QRadar® SIEM and IBM Security Access Manager appliances, helps IBM Security Identity Manager provide intelligent identity and access assurance. <span style=\"font-weight: bold;\">IBM Security Identity Manager:</span>\r\n<ul>\r\n<li>Empowers line of business managers to automate and define users’ access across the enterprise.</li>\r\n<li>Reduces complexity of enterprise identity management with centralized policy, integrated identity lifecycle management and support for third-party environments.</li>\r\n<li>Improves user assurance with strong authentication integration, audit reporting and closed-loop user activity monitoring.</li>\r\n<li>Provides effective and actionable compliance with centralized identity and access management across the enterprise.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Empowers Line of Business Managers</span>\r\n<ul>\r\n<li>Intuitive user interface and user reporting enables managers to make better governance decisions for employee access privileges.</li>\r\n<li>“Shopping cart” metaphor helps simplify access requests and improves user experience.</li>\r\n<li>Managers can easily view available entitlements for each user and request access updates.</li>\r\n<li>Reduces complexity of enterprise identity management</li>\r\n<li>Provide out-of-the-box support for managing user identities rights and passwords throughout the user lifecycle.</li>\r\n<li>Deliver policy-based identity management and reporting capabilities in a single, integrated package.</li>\r\n<li>Automate recertification of user entitlements for improved accuracy and compliance.</li>\r\n<li>Support multiple adapters for integration with various environments such as Oracle, Google, Microsoft and SAP.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Improves user assurance</span>\r\n<ul>\r\n<li>Improve user assurance with closed-loop user activity monitoring.</li>\r\n<li>Deliver reporting for user access rights through automatic synchronization of user data from different repositories.</li>\r\n<li>Provides effective and actionable compliance</li>\r\n<li>Create audit trails with detailed reports on account activities.</li>\r\n<li>Provide regular reports to business managers for easier and better decision making.</li>\r\n</ul>\r\n","shortDescription":"IBM Security Identity Manager enables organizations to drive effective identity management and governance across the enterprise for improved security and compliance. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM Security Identity Manager","keywords":"user, access, with, identity, Security, management, reporting, assurance","description":"Integration with other IBM Security products, such as IBM Security Identity Governance, IBM QRadar® SIEM and IBM Security Access Manager appliances, helps","og:title":"IBM Security Identity Manager","og:description":"Integration with other IBM Security products, such as IBM Security Identity Governance, IBM QRadar® SIEM and IBM Security Access Manager appliances, helps","og:image":"https://old.b4r.io/fileadmin/user_upload/IBM_LOGO.png"},"eventUrl":"","translationId":645,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"46":{"683":{"id":2816,"characteristicId":683,"templateId":46,"value":true},"685":{"id":2817,"characteristicId":685,"templateId":46,"value":true},"687":{"id":2818,"characteristicId":687,"templateId":46,"value":true},"689":{"id":2819,"characteristicId":689,"templateId":46,"value":"Yes"},"692":{"id":2820,"characteristicId":692,"templateId":46,"value":"Yes"},"694":{"id":2821,"characteristicId":694,"templateId":46,"value":true},"696":{"id":2822,"characteristicId":696,"templateId":46,"value":"Yes"},"698":{"id":2823,"characteristicId":698,"templateId":46,"value":"Yes"},"700":{"id":2824,"characteristicId":700,"templateId":46,"value":"Partially"},"702":{"id":2825,"characteristicId":702,"templateId":46,"value":"Yes"},"704":{"id":2826,"characteristicId":704,"templateId":46,"value":true},"706":{"id":2827,"characteristicId":706,"templateId":46,"value":"Yes"},"708":{"id":2828,"characteristicId":708,"templateId":46,"value":"Yes"}}}},{"id":644,"logoURL":"https://old.b4r.io/fileadmin/user_upload/IBM_LOGO.png","logo":true,"scheme":false,"title":"IBM SECURTITY IDENTITY MANAGER","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"ibm-securtity-identity-manager","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Ключевые функции:</span>\r\n<ul>\r\n<li>Автоматическое создание и управление привилегиями пользователей;</li>\r\n<li>Интеграция с другими продуктами безопасности IBM;</li>\r\n<li>Пользовательский интерфейс сервисного центра Identity (UI);</li>\r\n<li>Возможности самообслуживания;</li>\r\n<li>Функции согласования с замкнутой обратной связью;</li>\r\n<li>Интерфейс мобильного приложения;</li>\r\n<li>Интеграция сторонних производителей с дополнительными адаптерами.</li>\r\n</ul>\r\nIBM Security Identity Manager - это продукт, предназначенный для упрощения задачи назначения ролей пользователей и разрешений отдельным лицам на основе профилей пользователей. Он подходит к управлению идентичностью, объединяя автоматизированный подход с программным обеспечением на основе политик, чтобы помочь управлять правами доступа пользователей. Организации, особенно те, которые имеют значительное число сотрудников, часто должны совмещать безопасность своих корпоративных ресурсов с необходимостью прав доступа пользователей к этим ресурсам. IBM Security Identity Manager - это решение, предназначенное для упрощения этого процесса. Это позволяет конечным пользователям управлять правами доступа пользователей, и это освобождает ценное время для сотрудников информационных технологий (ИТ), которые в противном случае тратят время на установление прав доступа для пользователей.\r\n ","shortDescription":"IBM Security Identity Manager - это решение, которое помогает управлять правами доступа пользователей на расширенной корпоративной платформе.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM SECURTITY IDENTITY MANAGER","keywords":"пользователей, доступа, Identity, Manager, упрощения, которые, прав, основе","description":"Ключевые функции:\r\rАвтоматическое создание и управление привилегиями пользователей;\rИнтеграция с другими продуктами безопасности IBM;\rПользовательский","og:title":"IBM SECURTITY IDENTITY MANAGER","og:description":"Ключевые функции:\r\rАвтоматическое создание и управление привилегиями пользователей;\rИнтеграция с другими продуктами безопасности IBM;\rПользовательский","og:image":"https://old.b4r.io/fileadmin/user_upload/IBM_LOGO.png"},"eventUrl":"","translationId":2439,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"46":{"683":{"id":2829,"characteristicId":683,"templateId":46,"value":true},"685":{"id":2830,"characteristicId":685,"templateId":46,"value":true},"687":{"id":2831,"characteristicId":687,"templateId":46,"value":true},"689":{"id":2832,"characteristicId":689,"templateId":46,"value":"Да"},"692":{"id":2833,"characteristicId":692,"templateId":46,"value":"Да"},"694":{"id":2834,"characteristicId":694,"templateId":46,"value":true},"696":{"id":2835,"characteristicId":696,"templateId":46,"value":"Да"},"698":{"id":2836,"characteristicId":698,"templateId":46,"value":"Да"},"700":{"id":2837,"characteristicId":700,"templateId":46,"value":"Частично"},"702":{"id":2838,"characteristicId":702,"templateId":46,"value":"Да"},"704":{"id":2839,"characteristicId":704,"templateId":46,"value":true},"706":{"id":2840,"characteristicId":706,"templateId":46,"value":"Да"},"708":{"id":2841,"characteristicId":708,"templateId":46,"value":"Да"}}}},{"id":1944,"logoURL":"https://old.b4r.io/fileadmin/user_upload/microsoft.png","logo":true,"scheme":false,"title":"Microsoft Identity Manager","vendorVerified":0,"rating":"2.00","implementationsCount":4,"suppliersCount":0,"alias":"microsoft-identity-manager","companyTypes":[],"description":"Increase admin security with policies, privileged access and roles <span style=\"font-weight: bold;\">Why Microsoft Identity Manager</span>\r\n<ul>\r\n<li>Common identity. Simplify identity lifecycle management with automated workflows, business rules and easy integration with heterogenous platforms.</li>\r\n<li>Protect data. Discover and map permissions across multiple systems to individual, assignable roles. Use role mining tools to discover and modify permissions.</li>\r\n<li>Enable users. Empower users to take control of their identity, including group membership, smart card and password reset functions.</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Benefits of Microsoft Identity Manager</span>\r\n<ul>\r\n<li>It’s flexible. Customize with rules, policies and connectors to your business systems and provide self-service.</li>\r\n<li>It’s powerful. You make the rules and you enforce the rules. Flexible sync rules, workflows and policies that you define.</li>\r\n<li>Cloud-ready. Azure technologies such as hybrid reporting and Multi-Factor Authentication join password, group and certificate management.</li>\r\n<li>Good communicator. Detailed reports tell you what’s changing and the history of your identities, notifications, custom emails and approvals.</li>\r\n</ul>\r\n","shortDescription":"Microsoft Identity Manager - On-premises identity and access management\r\nSynchronize identities between directories, databases and apps. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Identity Manager","keywords":"rules, with, Identity, policies, Manager, Microsoft, identity, business","description":"Increase admin security with policies, privileged access and roles Why Microsoft Identity Manager\r\rCommon identity. Simplify identity lifecycle management with","og:title":"Microsoft Identity Manager","og:description":"Increase admin security with policies, privileged access and roles Why Microsoft Identity Manager\r\rCommon identity. Simplify identity lifecycle management with","og:image":"https://old.b4r.io/fileadmin/user_upload/microsoft.png"},"eventUrl":"","translationId":1945,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"46":{"683":{"id":3275,"characteristicId":683,"templateId":46,"value":true},"685":{"id":3276,"characteristicId":685,"templateId":46,"value":true},"687":{"id":3277,"characteristicId":687,"templateId":46,"value":true},"689":{"id":3278,"characteristicId":689,"templateId":46,"value":"Partially"},"692":{"id":3279,"characteristicId":692,"templateId":46,"value":"Partially"},"694":{"id":3280,"characteristicId":694,"templateId":46,"value":true},"696":{"id":3281,"characteristicId":696,"templateId":46,"value":"Yes"},"698":{"id":3282,"characteristicId":698,"templateId":46,"value":"Yes"},"700":{"id":3283,"characteristicId":700,"templateId":46,"value":"Yes"},"702":{"id":3284,"characteristicId":702,"templateId":46,"value":"Yes"},"704":{"id":3285,"characteristicId":704,"templateId":46,"value":true},"706":{"id":3286,"characteristicId":706,"templateId":46,"value":"Yes"},"708":{"id":3287,"characteristicId":708,"templateId":46,"value":"Partially"}}}},{"id":1950,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Micro_Focus__NetIQ_.jpg","logo":true,"scheme":false,"title":"NetIQ Identity & Access Management","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"netiq-identity-access-management","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Consistently enforce access rights across your business environment</span> Your business needs immediate, easy and secure access to information. But you must balance that with access controls that secure protected information and help you meet government mandates. With Identity-Powered Access solutions, you can quickly and cost-effectively integrate Identity and Access Management (IAM) policies across local, mobile and cloud environments. Our solutions use integrated identity information to create, modify, and retire identities and control their access. We provide Identity Management, Access Management, single sign-on (SSO), access governance, identity tracking and Active Directory (AD) administration. <span style=\"font-weight: bold;\">Give users quick and secure access to the resources they need</span> I need to balance the need to quickly revoke access with enabling immediate access to IT resources. How can I easily and quickly grant secure access to the correct people, both in the Cloud and in the enterprise? <span style=\"font-weight: bold;\">Make passwords secure and simple to remember</span> My users have to remember and use too many passwords. This leads to expensive reset calls, risks exposure from reuse, and causes user frustration. How can I enable a seamless single sign-on (SSO) experience across the enterprise and the Cloud? <span style=\"font-weight: bold;\">Make it easy to gain access to IT resources</span> When users need access to resources, the approvals need to happen quickly so those users can remain productive. How can I make it easier for users or managers to request, review and approve secure access to resources, no matter where they reside? <span style=\"font-weight: bold;\">Govern access for regulatory compliance</span> I need to demonstrate compliance with regulations or mandates that require controls to enforce least privilege access to sensitive information. Current certification processes are a burden on IT and the business. How can I more efficiently demonstrate access controls that limit access to only those that need it? <span style=\"font-weight: bold;\">Control and monitor privileged users</span> We are challenged to grant 'just enough' access and authority for people to do their jobs. Without fine-grained role or access control, we end up granting more rights or access than we should. How can I grant and enforce least privileges? <span style=\"font-weight: bold;\">Strengthen authentication without restricting productivity</span> My users' passwords are too easily compromised, and I deal with a growing list of requirements for stronger authentication to satisfy our security needs. How can I increase the security of access while keeping it easy for all of my users so they aren't burdened with an unwieldy environment? <span style=\"font-weight: bold;\">Identity-Powered Security</span> NetIQ can help you to achieve Identity-Powered Security by providing the tools you need to aggregate identity information from across your IT infrastructure, and integrate this information into your security monitoring tools, delivering the essential \"identity context\" teams need to recognize and address- potential attacks faster than ever before thought possible.","shortDescription":"NetIQ Identity & Access Management is a solution, you can quickly and cost-effectively integrate Identity and Access Management (IAM) policies across local, mobile and cloud environments.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"NetIQ Identity & Access Management","keywords":"access, need, users, information, secure, that, with, resources","description":"Consistently enforce access rights across your business environment Your business needs immediate, easy and secure access to information. But you must balance","og:title":"NetIQ Identity & Access Management","og:description":"Consistently enforce access rights across your business environment Your business needs immediate, easy and secure access to information. But you must balance","og:image":"https://old.b4r.io/fileadmin/user_upload/Micro_Focus__NetIQ_.jpg"},"eventUrl":"","translationId":1951,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"46":{"683":{"id":3314,"characteristicId":683,"templateId":46,"value":true},"685":{"id":3315,"characteristicId":685,"templateId":46,"value":true},"687":{"id":3316,"characteristicId":687,"templateId":46,"value":true},"689":{"id":3317,"characteristicId":689,"templateId":46,"value":"Yes"},"692":{"id":3318,"characteristicId":692,"templateId":46,"value":"Yes"},"694":{"id":3319,"characteristicId":694,"templateId":46,"value":true},"696":{"id":3320,"characteristicId":696,"templateId":46,"value":"Yes"},"698":{"id":3321,"characteristicId":698,"templateId":46,"value":"Yes"},"700":{"id":3322,"characteristicId":700,"templateId":46,"value":"Partially"},"702":{"id":3323,"characteristicId":702,"templateId":46,"value":"Yes"},"704":{"id":3324,"characteristicId":704,"templateId":46,"value":true},"706":{"id":3325,"characteristicId":706,"templateId":46,"value":"Yes"},"708":{"id":3326,"characteristicId":708,"templateId":46,"value":"Yes"}}}},{"id":1940,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Okta.png","logo":true,"scheme":false,"title":"Okta\tIdentity and Access Management","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"okta-identity-and-access-management","companyTypes":[],"description":"As a business expands and scales, it adapts with applications to streamline its network and operations. Where an employee may have once had one email password, now IT manages dozens of credentials for SaaS platforms on multiple devices. Knowing one security slip-up can be the end of business, identity access management solutions give IT the ability to manage access control and identity with the same speed and confidence for 10 employees as for 10,000. This frees them from time-consuming manual tasks – like password resets – and allows them to focus on more challenging, fulfilling projects to drive company growth. Setting up identity access management for your team While enabling employees for ease of access can come with hurdles, the ultimate return on investment is unparalleled. Finding the right fit for your applications is essential.","shortDescription":"Okta\tIdentity and Access Management (IAM) is a guide to keeping the identity of your business in check.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Okta\tIdentity and Access Management","keywords":"access, with, identity, them, your, password, management, applications","description":"As a business expands and scales, it adapts with applications to streamline its network and operations. Where an employee may have once had one email password,","og:title":"Okta\tIdentity and Access Management","og:description":"As a business expands and scales, it adapts with applications to streamline its network and operations. Where an employee may have once had one email password,","og:image":"https://old.b4r.io/fileadmin/user_upload/Okta.png"},"eventUrl":"","translationId":1941,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"46":{"683":{"id":3249,"characteristicId":683,"templateId":46,"value":true},"685":{"id":3250,"characteristicId":685,"templateId":46,"value":true},"687":{"id":3251,"characteristicId":687,"templateId":46,"value":true},"689":{"id":3252,"characteristicId":689,"templateId":46,"value":"Partially"},"692":{"id":3253,"characteristicId":692,"templateId":46,"value":"N/A"},"694":{"id":3254,"characteristicId":694,"templateId":46,"value":true},"696":{"id":3255,"characteristicId":696,"templateId":46,"value":"Yes"},"698":{"id":3256,"characteristicId":698,"templateId":46,"value":"Partially"},"700":{"id":3257,"characteristicId":700,"templateId":46,"value":"Yes"},"702":{"id":3258,"characteristicId":702,"templateId":46,"value":"Yes"},"704":{"id":3259,"characteristicId":704,"templateId":46,"value":true},"706":{"id":3260,"characteristicId":706,"templateId":46,"value":"Partially"},"708":{"id":3261,"characteristicId":708,"templateId":46,"value":"Yes"}}}},{"id":1938,"logoURL":"https://old.b4r.io/fileadmin/user_upload/oracle_logo.png","logo":true,"scheme":false,"title":"Oracle Identity Management (IdM) and Access Management","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"alias":"oracle-identity-management-idm-and-access-management","companyTypes":[],"description":"Oracle’s complete, integrated, next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity management solutions. Reduce operational costs. Achieve rapid compliance with regulatory mandates. Secure sensitive applications and data—regardless of whether they are hosted on premises or in the cloud. <span style=\"font-weight: bold;\">Identity Cloud</span> Oracle extends its leadership in IAM by introducing the next generation comprehensive security and identity platform that is cloud-native and designed to be an integral part of the enterprise security fabric, providing modern identity for modern applications. <span style=\"font-weight: bold;\">Identity Governance</span> Balance access, security, and compliance while reducing costs. Simplify account administration, streamline audit tasks, and managing identities across all your applications. <span style=\"font-weight: bold;\">Access Management</span> The industry’s most advanced solution for securing applications, data, and web- and cloud-based services. Oracle Access Management Oracle API Gateway Oracle Enterprise Single Sign-On <span style=\"font-weight: bold;\">Directory Services</span> The only integrated directory solution optimized for cloud, mobile, and social ecosystems. Designed to deliver breakthrough performance for mission-critical enterprise and carrier-grade environments.","shortDescription":"Oracle Identity Management (IdM) and Access Management is complete, integrated, next-generation identity management platform provides breakthrough scalability ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Oracle Identity Management (IdM) and Access Management","keywords":"Oracle, applications, identity, Management, security, Identity, Access, solution","description":"Oracle’s complete, integrated, next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity","og:title":"Oracle Identity Management (IdM) and Access Management","og:description":"Oracle’s complete, integrated, next-generation identity management platform provides breakthrough scalability with an industry-leading suite of identity","og:image":"https://old.b4r.io/fileadmin/user_upload/oracle_logo.png"},"eventUrl":"","translationId":1939,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"46":{"683":{"id":3236,"characteristicId":683,"templateId":46,"value":true},"685":{"id":3237,"characteristicId":685,"templateId":46,"value":true},"687":{"id":3238,"characteristicId":687,"templateId":46,"value":true},"689":{"id":3239,"characteristicId":689,"templateId":46,"value":"Yes"},"692":{"id":3240,"characteristicId":692,"templateId":46,"value":"Partially"},"694":{"id":3241,"characteristicId":694,"templateId":46,"value":true},"696":{"id":3242,"characteristicId":696,"templateId":46,"value":"Yes"},"698":{"id":3243,"characteristicId":698,"templateId":46,"value":"Yes"},"700":{"id":3244,"characteristicId":700,"templateId":46,"value":"Yes"},"702":{"id":3245,"characteristicId":702,"templateId":46,"value":"Yes"},"704":{"id":3246,"characteristicId":704,"templateId":46,"value":true},"706":{"id":3247,"characteristicId":706,"templateId":46,"value":"Yes"},"708":{"id":3248,"characteristicId":708,"templateId":46,"value":"Partially"}}}},{"id":1948,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Ping_Identity.png","logo":true,"scheme":false,"title":"Ping Intelligent Identity Platform","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"ping-intelligent-identity-platform","companyTypes":[],"description":"IDENTITY ENABLES A SECURE, CONNECTED AND AGILE ENTERPRISE Organizations compete in a new digital era where user experience is increasingly important, and security can’t be sacrificed. The Ping Intelligent Identity Platform enables your organization to leverage a unified digital identity for secure and seamless user experiences across your business initiatives, allowing you to achieve greater business value and agility. Our comprehensive, standards-based platform allows users and devices to securely access all cloud, mobile, SaaS, and on-premises applications and APIs. Designed for hybrid IT environments, it can be deployed on-premises, in the cloud, or both, and provides centralized control to optimize the balance of security and convenience for a wide range of use cases. ONE PLATFORM. ALL IDENTITIES. Ping can help you deliver great digital experiences to all your employees, partners and customers. Our versatile platform can quickly solve your most important challenge first. Is it enabling a mobile and distributed workforce with single sign-on to all their applications? Is it giving customers a single identity customer experience that includes seamless registration, authentication and consent management? Is it providing self-service identity management capabilities to partners? Or is it implementing a global authentication authority to provide centralized control and real-time, intelligent access to resources across your organization? Your path to protecting all identities with one platform can start anywhere and grow with your needs. IDENTITY INTELLIGENCE IMPROVES SECURITY AND USER EXPERIENCE Organizations need strong security. Users want more convenience and ease of use. Our intelligent identity platform allows you to achieve both simultaneously, rather than trading one for another. Ping can give your organization an advanced degree in identity intelligence with a range of capabilities to support real-time access and authorization decisions, adaptive authentication, and more:\r\n<ul>\r\n<li>Policies to enforce authentication/authorization business rules</li>\r\n<li>Artificial intelligence to analyze and detect anomalous behavior</li>\r\n<li>Integration with multiple risk, fraud and threat signals</li>\r\n<li>Multiple authentication methods to obtain varying levels of assurance</li>\r\n<li>Sync, aggregate and secure information from multiple sources</li>\r\n</ul>\r\nIDENTITY FOR CLOUD AND HYBRID IT The Ping Intelligent Identity Platform is architected for enterprise hybrid IT environments so you can manage Identity and Access Management (IAM) how and where you’d like. We offer multi-tenant Identity-as-a-Service (IDaaS) in the cloud, and a market-leading software solution that can be deployed in your data center or your private cloud. This flexible approach supports a full range of enterprise use cases across all stages of cloud adoption. With Ping, you can closely align an IAM solution with your available resources, application deployments and customization needs, and continue to leverage the same platform when your requirements change. EXTENSIBLE AND CUSTOMIZABLE No two organizations are exactly the same. That’s why we built our entire solution on open standards for maximum interoperability and extensibility. We provide extensive APIs for integration and customization, and we invest in turnkey integration kits that rapidly connect to all your SaaS, web, mobile and legacy apps. SELF SERVICE FOR ALL We know that managing identities and customer experiences at enterprise scale is challenging. This is why we offer numerous self-service features to give administrators, developers and users more efficient and positive experiences. Administrators can control product and environment configurations from a top-level view, and they can delegate administrative access across the organization to better serve their end users. Developers can quickly embed identity services into their apps, which allows them to get back to developing new features for strategic business value. And we make it easy for users to create new accounts, manage profiles and control their data. GLOBAL AUTHENTICATION AUTHORITY FOR YOUR ENTERPRISE By leveraging the Ping Intelligent Identity Platform as a central authentication authority for all workforce, partner and customer use cases, you can achieve better security and compliance while delivering a superior user experience with single sign-on and intelligent access to all authorized services. Our flexibility, scalability and performance are unmatched, and our platform will allow you to orchestrate a wide range of authentication use cases with policy-based controls that leverage diverse contextual attributes and signals.\r\n ","shortDescription":"Ping Identity Intelligent Identity Platform is One platform to improve security and engagement across your digital business","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Ping Intelligent Identity Platform","keywords":"your, with, authentication, Ping, platform, identity, Identity, access","description":"IDENTITY ENABLES A SECURE, CONNECTED AND AGILE ENTERPRISE Organizations compete in a new digital era where user experience is increasingly important, and","og:title":"Ping Intelligent Identity Platform","og:description":"IDENTITY ENABLES A SECURE, CONNECTED AND AGILE ENTERPRISE Organizations compete in a new digital era where user experience is increasingly important, and","og:image":"https://old.b4r.io/fileadmin/user_upload/Ping_Identity.png"},"eventUrl":"","translationId":1949,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"Управление учётными данными (англ. Identity management, сокр. IdM) — комплекс подходов, практик, технологий и специальных программных средств для управления учётными данными пользователей, системами контроля и управления доступом (СКУД), с целью повышения безопасности и производительности информационных систем при одновременном снижении затрат, оптимизации времени простоя и сокращения количества повторяющихся задач.\r\n\r\nИсточник: https://ru.wikipedia.org/wiki/%D0%A3%D0%BF%D1%80%D0%B0%D0%B2%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5_%D1%83%D1%87%D1%91%D1%82%D0%BD%D1%8B%D0%BC%D0%B8_%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D0%BC%D0%B8","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"46":{"683":{"id":3301,"characteristicId":683,"templateId":46,"value":true},"685":{"id":3302,"characteristicId":685,"templateId":46,"value":"N/A"},"687":{"id":3303,"characteristicId":687,"templateId":46,"value":true},"689":{"id":3304,"characteristicId":689,"templateId":46,"value":"Yes"},"692":{"id":3305,"characteristicId":692,"templateId":46,"value":"N/A"},"694":{"id":3306,"characteristicId":694,"templateId":46,"value":true},"696":{"id":3307,"characteristicId":696,"templateId":46,"value":"Yes"},"698":{"id":3308,"characteristicId":698,"templateId":46,"value":"N/A"},"700":{"id":3309,"characteristicId":700,"templateId":46,"value":"Yes"},"702":{"id":3310,"characteristicId":702,"templateId":46,"value":"Yes"},"704":{"id":3311,"characteristicId":704,"templateId":46,"value":true},"706":{"id":3312,"characteristicId":706,"templateId":46,"value":"N/A"},"708":{"id":3313,"characteristicId":708,"templateId":46,"value":"Partially"}}}}],"selectedTemplateId":46},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}