{"global":{"lastError":{},"locale":"de","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"role-supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"products-popover":{"ru":"Продукты","_type":"localeString","en":"Products","de":"die produkte"},"introduction-popover":{"_type":"localeString","en":"introduction","ru":"внедрения"},"partners-popover":{"_type":"localeString","en":"partners","ru":"партнеры"},"update-profile-button":{"en":"Update profile","ru":"Обновить профиль","_type":"localeString"},"read-more-button":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"user-implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"categories":{"_type":"localeString","en":"Categories","ru":"Компетенции"},"description":{"en":"Description","ru":"Описание","_type":"localeString"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"en":"Partnership with suppliers","ru":"Партнерство с поставщиками","_type":"localeString"},"reference-bonus":{"_type":"localeString","en":"Bonus 4 reference","ru":"Бонус за референс"},"partner-status":{"_type":"localeString","en":"Partner status","ru":"Статус партнёра"},"country":{"_type":"localeString","en":"Country","ru":"Страна"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"ru":"область деятельности","_type":"localeString","en":"branch"},"employees-popover":{"en":"number of employees","ru":"количество сотрудников","_type":"localeString"},"partnership-programme":{"_type":"localeString","en":"Partnership program","ru":"Партнерская программа"},"partner-discounts":{"ru":"Партнерские скидки","_type":"localeString","en":"Partner discounts"},"registered-discounts":{"_type":"localeString","en":"Additional benefits for registering a deal","ru":"Дополнительные преимущества за регистрацию сделки"},"additional-advantages":{"ru":"Дополнительные преимущества","_type":"localeString","en":"Additional Benefits"},"additional-requirements":{"en":"Partner level requirements","ru":"Требования к уровню партнера","_type":"localeString"},"certifications":{"en":"Certification of technical specialists","ru":"Сертификация технических специалистов","_type":"localeString"},"sales-plan":{"en":"Annual Sales Plan","ru":"Годовой план продаж","_type":"localeString"},"partners-vendors":{"_type":"localeString","en":"Partners-vendors","ru":"Партнеры-производители"},"partners-suppliers":{"ru":"Партнеры-поставщики","_type":"localeString","en":"Partners-suppliers"},"all-countries":{"ru":"Все страны","_type":"localeString","en":"All countries"},"supplied-products":{"_type":"localeString","en":"Supplied products","ru":"Поставляемые продукты"},"vendored-products":{"en":"Produced products","ru":"Производимые продукты","_type":"localeString"},"vendor-implementations":{"en":"Produced deployments","ru":"Производимые внедрения","_type":"localeString"},"supplier-implementations":{"_type":"localeString","en":"Supplied deployments","ru":"Поставляемые внедрения"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"ru":"Pасписание событий","_type":"localeString","en":"Events schedule"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"register":{"_type":"localeString","en":"Register","ru":"Регистрация "},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"_type":"localeString","en":"Company presentation","ru":"Презентация компании"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"_type":"localeString","en":"ROI calculators","ru":"ROI калькуляторы"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"ru":"Salestools","_type":"localeString","en":"Salestools","de":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"_type":"localeString","en":"blog","ru":"блог"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"_type":"localeString","en":"Saving type","ru":"Тип экономии"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"title":{"ru":"ROI4CIO: Компания","_type":"localeString","en":"ROI4CIO: Company"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"content":"website","name":"og:type"}],"translatable_meta":[{"translations":{"ru":"Компания","_type":"localeString","en":"Company"},"name":"title"},{"translations":{"_type":"localeString","en":"Company description","ru":"Описание компании"},"name":"description"},{"name":"keywords","translations":{"_type":"localeString","en":"Company keywords","ru":"Ключевые слова для компании"}}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"united-way-of-greater-atlanta":{"id":4373,"title":"United Way of Greater Atlanta","logoURL":"https://old.roi4cio.com/uploads/roi/company/United_Way_of_Greater_Atlanta_logo.jpg","alias":"united-way-of-greater-atlanta","address":"","roles":[{"id":1,"type":"user"}],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">What are we about?</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">United Way of Greater Atlanta invests in more than 200 programs in 13 counties through the United Way Child Well-Being Impact Fund. But, that’s not all. We bring together people and resources to tackle complex community issues and drive sustainable positive change to help our community thrive.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Vision</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Greater Atlanta is a community where all individuals and families thrive — a community where everyone has the opportunity to live a healthy life, acquire the education and skills they need to earn a good living and have a roof over their heads.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Mission</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Engage and bring together people and resources to drive sustainable improvements in the well-being of children, families and individuals in the community.</span>","companyTypes":["user"],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[{"id":544,"title":"Trend Micro Endpoint Security for Nonprofit, Charity","description":"Upgrades endpoint security, addressing the changing needs of a mobile workforce\r\nUnited Way of Greater Atlanta\r\nEmployees: 220\r\nIndustry: Nonprofit, Charity\r\nRegion: Atlanta, Georgia\r\n<span style=\"font-weight: bold;\">Products</span>\r\n<ul><li>User Protection</li><li>Smart Protection Suite</li><li>Smart Protection for Endpoints</li><li>OfficeScan</li><li>Endpoint Encryption</li><li>Data Loss Prevention (DLP)</li><li>Control Manager</li><li>Deep Security</li></ul>\r\n<span style=\"font-weight: bold;\">IT Environment</span>\r\n<ul><li>Microsoft Office 365</li><li>VMware 260+ endpoints</li><li>50-60 virtual desktops</li><li>PC and mac</li><li>mobile</li></ul>\r\n<span style=\"font-weight: bold;\">Overview</span>\r\nFor more than 100 years, United Way of Greater Atlanta has been serving its community. Today, it works in 13 counties in and around the greater metropolitan area. As one of the largest United Way organizations in the country, it invests $100 million annually in more than 200 programs. The charitable organization focuses on helping children succeed in school, helping families become financially stable, improving health outcomes for people of all ages, and reducing chronic homelessness.\r\nA 10-member IT team supports 200 staff members at eight offices and 20 remote call center agents who take community calls for assistance from their homes. More than 50 seasonal workers join the organization on virtual desktops during the fall pledge drive. Several years ago, United Way of Greater Atlanta virtualized servers and desktops and today runs a completely virtualized environment on the VMware platform.\r\nTo honor their mobile workforce, the organization supports a bring-your-own device (BYOD) program with Airwatch management and has replaced about 70% of staff desktops with laptops. IT recently deployed Microsoft Office 365 and now encourages staff to move from other cloud file sharing programs to Microsoft OneDrive.\r\n<span style=\"font-weight: bold;\">Challenges</span>\r\nWhen a big retailer suffers a breach, people don’t necessarily stop shopping with that retailer. A breach at United Way of Greater Atlanta, however, could send donors looking for a safer place to put their information and contributions. That’s why protecting donor or recipient data is so important for the nonprofit. “We face the same security challenges as many large organizations, such as data leakage, data loss prevention and intrusion detection. For us, there is a higher degree of risk because we are a volunteer-led, donor-driven organization,” said Orinzal Williams, Executive Director of IT for United Way of Greater Atlanta.\r\nNot only does United Way of Greater Atlanta compete with other nonprofits, but it competes with organizations that deliver transaction services to nonprofits as a way to expedite contributions. United Way vows to return 90% of its funds back to the community, which requires keeping overhead low. “We have to remain competitive while keeping our donor information secure,” said Williams.\r\nLike many large organizations, United Way of Greater Atlanta needed to revisit its endpoint security solution to address changes in how today’s workers do their jobs. An endpoint solution that had served the organization for about seven years was inadequate in an environment of laptops, mobile phones, and security issues around public cloud file storage solutions like Dropbox or Box.\r\nWith 268 endpoints to secure and an additional 50 or 60 virtual desktops during the fall fund drive, the small IT team was usually reacting to a problem rather than proactively preventing it. “We needed a more robust endpoint security solution that would help us stay on top of security without devoting a lot of time to it,” said Williams.\r\n<span style=\"font-style: italic;\">"Smart Protection for Endpoints allows us to be more efficient and compliant. When IT is efficient, the organization is being efficient with donor dollars and more money goes to the community. That’s a huge benefit." Orinzal Williams, Executive director of IT, United Way of Greater Atlanta </span>\r\n<span style=\"font-weight: bold;\">Why Trend Micro</span>\r\nTo protect sensitive information on laptops, United Way of Greater Atlanta sought a new endpoint security solution capable of on- and off-premises protection. While Williams did look at solutions from other well-known security vendors, Trend Micro was always top of mind. <span style=\"font-style: italic;\">“I’m a huge fan of Trend Micro Deep Security,” said Williams, who uses the solution to protect the organization’s VMware environment. “I called the Trend Micro rep to ask if they had anything to help us out. We had a 15-minute conversation about Smart Protection for Endpoints, and I was sold,” he adde</span>\r\n<span style=\"font-style: italic;\">“The members of my team wear multiple hats. We can’t have something that is so complicated it requires a dedicated resource to manage it. We needed the best combination of robustness and ease of use, where we can set it up but not babysit it all day. For this reason, Trend Micro was the best solution for us,” said Williams. “We started using Smart Protection for Endpoints immediately without additional training, because the dashboard is just like Deep Security,” he added</span>\r\n<span style=\"font-style: italic;\">"We used to put everything else on hold to combat the spread of malware on files on the server. With Smart Protection for Endpoints, we get an alert that the firewall has quarantined a machine on its own. Now we have one machine to check and nothing else that has to be done – no issue on the server or on other machines." Orinzal Williams, Executive director of IT, United Way of Greater Atlanta</span>\r\n<span style=\"font-weight: bold;\">Solution</span>\r\nWith help from a simple setup program, it took Williams about 45 minutes to deploy Smart Protection for Endpoints and install it on ten IT machines before launching a staged deployment to the rest of the organization. The suite offers protection against traditional attacks and the latest targeted attacks. “Smart Protection for Endpoints works with our Mac hardware, has BYOD functionality, and is lightweight and easy to deploy to our remote workforce,” said Williams.\r\nTo ensure protection now and in the future, IT decided to purchase a full suite of complementary endpoint solutions that deliver multiple layers of interconnected threat and data protection. “We may not use everything, but it’s there if we need it or auditors request it,” said Williams. The Security for Mac module adds a layer of protection for a growing number of Apple Mac clients in the network. The organization also uses the solution’s firewall, built-in compliance rules, endpoint encryption, and data loss prevention (DLP) module. They are currently testing virtual patching.\r\nThe DLP module ensures compliance with IT policy by blocking any attempts to send out sensitive information or inadvertently store it on the local hard drive. “When I know certain people are working with sensitive information, I can target their machines for DLP. Once we install the agent on the desktop, I can activate it from the console, and DLP is automatically put in place,” Williams added. “With DLP and other plug-ins, we are confident we are not leaking information out.”\r\nSetting policies is an important part of controlling user behavior, such as ensuring users can’t execute dangerous applications on endpoints. “We manage our remote agents by setting up a profile for on-network use and strengthening it for off-network,” said Williams.\r\nThe IT team makes extensive use of Trend Micro Control Manager, which provides a central view and reporting across connected Trend Micro security. “I really love the visibility into the machines and the control we have. We can do a little or a whole lot with it – we can have a basic level of protection or go deep and block certain applications at the firewall process. This really fits how we work,” said Williams, who jumps to many different tasks in the course of a day.\r\nAlerts and reports help Williams and his team respond quickly to issues in the environment. Williams can target machines that don’t have the current version of security software, so the IT team can find out why they didn’t update. He can also follow an alert on a quarantined machine with a scan, if necessary.\r\n<span style=\"font-style: italic;\">"Smart Protection for Endpoints allows us to be more efficient and compliant. When IT is efficient, the organization is being efficient with donor dollars and more money goes to the community. That’s a huge benefit." Orinzal Williams, Executive director of IT, United Way of Greater Atlanta </span>\r\n<span style=\"font-weight: bold;\">Results</span>\r\nMultitasking got easier for the IT team following implementation of Smart Protection for Endpoints. Before deploying the security suite, IT faced from eight to 20 security issues a week, any one of which could spread malware or a Trojan like CryptoLocker to files on the server. It took all hands on deck to run solutions to combat a serious security issue. With Smart Protection for Endpoints, IT receives an alert that the firewall has automatically quarantined a machine. “Now we have one isolated issue to check and nothing else that has to be done – no issue on the server or on other machines. The threat probably didn’t even take hold on the original machine,” said Williams.\r\n<span style=\"font-style: italic;\">“Smart Protection for Endpoints does a great job of blocking unwanted traffic. It flags bad websites and stops malware entering from spam emails. It also flags personal email, which covers a huge hole and is a big win for us,” said Williams. He estimates that 50 threats – mostly malware from web traffic – have been blocked by Smart Protection for Endpoints since its implementation four months ago. The software is so efficient that the server never gets above 10% utilization. “The system remains efficient even when we have scheduled scans,” said Williams.</span>\r\nSmart Protection for Endpoints alerts, reports, and preprogrammed compliance features ensure a small IT team can operate efficiently to protect donor information at United Way of Greater Atlanta. “I don’t want to see us spending a lot of money on internal operations. I want the money to help the community. Since deploying Smart Protection for Endpoints, we know we are delivering the best service without increasing our workload,” said Williams. “I can say with confidence to our board that the combination of Deep Security and Smart Protection for Endpoints ensures we are taking all the necessary steps to make our environment secure,” he added\r\nWilliams has not had to call in a support ticket for Smart Protection for Endpoints. However, he’s confident that if an issue developed he would receive exemplary service. In all the time he’s used Deep Security, he’s only called in five tickets, and only one of those required an escalation. He received a call back on the escalation within the hour. “Trend Micro worked with us on the problem after hours until we got it resolved,” said Williams. “The fact that I’ve only had five tickets is a testament to the quality of Trend Micro software,” he added\r\n<span style=\"font-weight: bold;\">What's next?</span>\r\n<span style=\"font-style: italic;\">“We are still trying to figure out what actions we need to take for the cloud,” said Williams. The organization migrated to Office 365 almost a year ago, so most file sharing now takes place through OneDrive. Currently, they rely on the Smart Protection for Endpoints DLP module and built-in Microsoft protection on Office 365 to protect data in cloud applications. As Williams investigates a more layered defense for cloud apps, he will certainly look into Trend Micro solutions and consider their applicability for United Way of Greater Atlanta</span>","alias":"trend-micro-endpoint-security-for-nonprofit-charity","roi":0,"seo":{"title":"Trend Micro Endpoint Security for Nonprofit, Charity","keywords":"","description":"Upgrades endpoint security, addressing the changing needs of a mobile workforce\r\nUnited Way of Greater Atlanta\r\nEmployees: 220\r\nIndustry: Nonprofit, Charity\r\nRegion: Atlanta, Georgia\r\n<span style=\"font-weight: bold;\">Products</span>\r\n<ul><li>User Protection</l","og:title":"Trend Micro Endpoint Security for Nonprofit, Charity","og:description":"Upgrades endpoint security, addressing the changing needs of a mobile workforce\r\nUnited Way of Greater Atlanta\r\nEmployees: 220\r\nIndustry: Nonprofit, Charity\r\nRegion: Atlanta, Georgia\r\n<span style=\"font-weight: bold;\">Products</span>\r\n<ul><li>User Protection</l"},"deal_info":"","user":{"id":4373,"title":"United Way of Greater Atlanta","logoURL":"https://old.roi4cio.com/uploads/roi/company/United_Way_of_Greater_Atlanta_logo.jpg","alias":"united-way-of-greater-atlanta","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">What are we about?</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">United Way of Greater Atlanta invests in more than 200 programs in 13 counties through the United Way Child Well-Being Impact Fund. But, that’s not all. We bring together people and resources to tackle complex community issues and drive sustainable positive change to help our community thrive.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Vision</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Greater Atlanta is a community where all individuals and families thrive — a community where everyone has the opportunity to live a healthy life, acquire the education and skills they need to earn a good living and have a roof over their heads.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Mission</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Engage and bring together people and resources to drive sustainable improvements in the well-being of children, families and individuals in the community.</span>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.unitedwayatlanta.org/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"United Way of Greater Atlanta","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">What are we about?</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">United Way of Greater Atlanta invests in mo","og:title":"United Way of Greater Atlanta","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">What are we about?</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">United Way of Greater Atlanta invests in mo","og:image":"https://old.roi4cio.com/uploads/roi/company/United_Way_of_Greater_Atlanta_logo.jpg"},"eventUrl":""},"supplier":{"id":4372,"title":"Trend Micro","logoURL":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png","alias":"trend-micro","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">For nearly 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.</span>","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"https://www.trendmicro.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Trend Micro","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:title":"Trend Micro","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:image":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png"},"eventUrl":""},"vendors":[{"id":4372,"title":"Trend Micro","logoURL":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png","alias":"trend-micro","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">For nearly 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.</span>","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":6,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":3,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"https://www.trendmicro.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Trend Micro","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:title":"Trend Micro","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250+ million endpoints. 500,000+ companies worldwide. One security software company.</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-ser","og:image":"https://old.roi4cio.com/uploads/roi/company/Trend_Micro.png"},"eventUrl":""}],"products":[{"id":1734,"logo":false,"scheme":false,"title":"Trend Micro Endpoint Security","vendorVerified":0,"rating":"1.40","implementationsCount":3,"suppliersCount":0,"alias":"trend-micro-endpoint-security","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a list of known malware signatures is far less CPU-intensive than the more advanced behavior-based detection techniques.) But with new variants of crypto-ransomware being released every minute, the usefulness of signature based detection as a standalone security technique is waning. To provide any real value to an enterprise, it must be complemented by a wide range of other techniques. Still, signature-based detection should be a part of a multi-layered security approach, including:\r\n<ul> <li>File and web reputation – Blocks the execution of any files, URLs and websites that match the signature of a known malicious item, but has difficulties with unknown/unrecognized threats (such as polymorphic or packed malware) or attacks originating from a ‘good’ ISP or data center.</li> <li>C&C blocking – Examines and shuts down endpoint traffic (over any port) that is attempting to connect to or contact a known command-and-control (C&C) server.</li> </ul>\r\n<span style=\"font-weight: bold;\">Non-signature-based detection</span> These techniques defend against malware without requiring any previous knowledge of exact file signatures. Instead, they make determinations based on a file’s characteristics and behavior. Some of the techniques to be included in a multi-layered security approach include the following: <span style=\"font-weight: bold;\">Variant protection</span> Variant protection looks for obfuscated, polymorphic or variants of malware by using fragments of previously seen malware and detection algorithms. <span style=\"font-weight: bold;\">Census check</span> The likelihood that a file is malicious can be determined in part by its prevalence and maturity (i.e., how often it has been seen over a given time period). Files that have never been detected are considered to be more suspicious. This technique has proven to be quite strong against malware hash factories. <span style=\"font-weight: bold;\">Whitelisting check</span> To reduce false positives on endpoint detections, all files should be checked against a database of known and verified good files. (As an example, Trend Micro’s certified safe software whitelist contains almost one billion known good files.) <span style=\"font-weight: bold;\">Behavioral analysis</span> This technique examines an item as it is unpacked, looking for suspicious or unusual behavior in how it interacts with operating systems, applications and scripts — even if the item isn’t on a blacklist. While crypto-ransomware can easily pass by traditional anti-virus (by being a freshly compiled executable), it will behave suspiciously as it loads into memory, triggering further action. As attackers are still finding it difficult to evade behavior-based detection, this technique is a must-have for any organization. Behavioral analysis can take many forms, including:\r\n<ul> <li>Script protection – Checks for malicious code or scripts within files attempting to execute on the endpoint (e.g., Office macros, scripts in PDF, PowerShell scripts).</li> <li>Injection protection – Blocks processes from injecting code where it shouldn’t be (such as program libraries).</li> <li>Suspicious action monitoring – Examines an item as it is loading or running, looking for suspicious behavior in how it interacts with other processes.</li> <li>Ransomware protection – Looks for rapid obfuscation/encryption of files by an unknown process, then terminates that process and restores the encrypted files.</li> <li>Memory inspection – Evaluates processes running in memory, scanning them for malware (or fragments of recognizable malware) as an item is unpacked into memory. This ensures malware packer tools can’t just obfuscate an older known piece of malware.</li> <li>Browser exploit protection – Uses emulation and algorithmic detection technology to protect against exploit code on web pages (e.g., exploits in Java and Flash).</li> </ul>\r\n<span style=\"font-weight: bold;\">Exploit prevention</span> While there are hundreds of thousands of malicious files out there, there aren’t very many unique exploits that can be used to compromise a user’s system. As such, it is often easier to focus on preventing the exploitation of specific application or OS-related vulnerabilities rather than blocking the files themselves. Also known as vulnerability shielding, exploit prevention techniques can include:\r\n<ul> <li>Host-based firewalls – Protects endpoints on the network using stateful inspection and network virus scanning.</li> <li>Exploit protection – Monitors programs that demonstrate abnormal behavior associated with exploit attacks, and uses multiple heuristic analysis techniques to detect exploit code on web pages as users attempt to access them with their browsers.</li> <li>Intrusion prevention – Blocks network-based exploits of known vulnerabilities in popular applications and operating systems by using host-based intrusion prevention (HIPS) rules that provide a virtual patch.</li> </ul>\r\n","shortDescription":"Trend Micro Endpoint Security - Defend against the threats of today and tomorrow with XGen™ security","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Trend Micro Endpoint Security","keywords":"","description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a l","og:title":"Trend Micro Endpoint Security","og:description":"<span style=\"font-weight: bold;\">Signature-based detection</span> Traditional signature-based anti-virus and anti-malware offer a high level of protection against known threats in a very computationally efficient way. (The process of matching files against a l"},"eventUrl":"","translationId":1735,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":306,"title":"Manage Risks"},{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":400,"title":"High costs"},{"id":397,"title":"Insufficient risk management"}]}},"categories":[{"id":40,"title":"Endpoint security","alias":"endpoint-security","description":"In network security, endpoint security refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats. Endpoint security is designed to secure each endpoint on the network created by these devices.\r\nUsually, endpoint security is a security system that consists of security software, located on a centrally managed and accessible server or gateway within the network, in addition to client software being installed on each of the endpoints (or devices). The server authenticates logins from the endpoints and also updates the device software when needed. While endpoint security software differs by vendor, you can expect most software offerings to provide antivirus, antispyware, firewall and also a host intrusion prevention system (HIPS).\r\nEndpoint security is becoming a more common IT security function and concern as more employees bring consumer mobile devices to work and companies allow its mobile workforce to use these devices on the corporate network.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What are endpoint devices?</span>\r\nAny device that can connect to the central business network is considered an endpoint. Endpoint devices are potential entry points for cybersecurity threats and need strong protection because they are often the weakest link in network security.\r\n<span style=\"font-weight: bold;\">What is endpoint security management?</span>\r\nA set of rules defining the level of security that each device connected to the business network must comply with. These rules may include using an approved operating system (OS), installing a virtual private network (VPN), or running up-to-date antivirus software. If the device connecting to the network does not have the desired level of protection, it may have to connect via a guest network and have limited network access.\r\n<span style=\"font-weight: bold;\">What is endpoint security software?</span>\r\nPrograms that make sure your devices are protected. Endpoint protection software may be cloud-based and work as SaaS (Software as a Service). Endpoint security software can also be installed on each device separately as a standalone application.\r\n<span style=\"font-weight: bold;\">What is endpoint detection and response (EDR)?</span>\r\nEndpoint detection and response (EDR) solutions analyze files and programs, and report on any threats found. EDR solutions monitor continuously for advanced threats, helping to identify attacks at an early stage and respond rapidly to a range of threats.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Endpoint_security.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.trendmicro.com/en_us/about/customer-stories/uw-atlanta-sps.html","title":"Web-site of vendor"}},"comments":[],"referencesCount":0}],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"branches":"Public and non-profit organizations","companySizes":"101 to 500 Employees","companyUrl":"https://www.unitedwayatlanta.org/","countryCodes":["USA"],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"United Way of Greater Atlanta","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">What are we about?</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">United Way of Greater Atlanta invests in mo","og:title":"United Way of Greater Atlanta","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">What are we about?</span></div>\r\n<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">United Way of Greater Atlanta invests in mo","og:image":"https://old.roi4cio.com/uploads/roi/company/United_Way_of_Greater_Atlanta_logo.jpg"},"eventUrl":"","vendorPartners":[],"supplierPartners":[],"vendoredProducts":[],"suppliedProducts":[],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}