{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"company":{"role-vendor":{"en":"Vendor","ru":"Производитель","_type":"localeString"},"role-supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"products-popover":{"ru":"Продукты","_type":"localeString","en":"Products","de":"die produkte"},"introduction-popover":{"_type":"localeString","en":"introduction","ru":"внедрения"},"partners-popover":{"_type":"localeString","en":"partners","ru":"партнеры"},"update-profile-button":{"ru":"Обновить профиль","_type":"localeString","en":"Update profile"},"read-more-button":{"_type":"localeString","en":"Show more","ru":"Показать ещё"},"hide-button":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"user-implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"categories":{"en":"Categories","ru":"Компетенции","_type":"localeString"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"role-user":{"ru":"Пользователь","_type":"localeString","en":"User"},"partnership-vendors":{"ru":"Партнерство с производителями","_type":"localeString","en":"Partnership with vendors"},"partnership-suppliers":{"ru":"Партнерство с поставщиками","_type":"localeString","en":"Partnership with suppliers"},"reference-bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus 4 reference"},"partner-status":{"ru":"Статус партнёра","_type":"localeString","en":"Partner status"},"country":{"_type":"localeString","en":"Country","ru":"Страна"},"partner-types":{"ru":"Типы партнеров","_type":"localeString","en":"Partner types"},"branch-popover":{"_type":"localeString","en":"branch","ru":"область деятельности"},"employees-popover":{"ru":"количество сотрудников","_type":"localeString","en":"number of employees"},"partnership-programme":{"en":"Partnership program","ru":"Партнерская программа","_type":"localeString"},"partner-discounts":{"_type":"localeString","en":"Partner discounts","ru":"Партнерские скидки"},"registered-discounts":{"ru":"Дополнительные преимущества за регистрацию сделки","_type":"localeString","en":"Additional benefits for registering a deal"},"additional-advantages":{"_type":"localeString","en":"Additional Benefits","ru":"Дополнительные преимущества"},"additional-requirements":{"ru":"Требования к уровню партнера","_type":"localeString","en":"Partner level requirements"},"certifications":{"_type":"localeString","en":"Certification of technical specialists","ru":"Сертификация технических специалистов"},"sales-plan":{"en":"Annual Sales Plan","ru":"Годовой план продаж","_type":"localeString"},"partners-vendors":{"en":"Partners-vendors","ru":"Партнеры-производители","_type":"localeString"},"partners-suppliers":{"en":"Partners-suppliers","ru":"Партнеры-поставщики","_type":"localeString"},"all-countries":{"en":"All countries","ru":"Все страны","_type":"localeString"},"supplied-products":{"ru":"Поставляемые продукты","_type":"localeString","en":"Supplied products"},"vendored-products":{"en":"Produced products","ru":"Производимые продукты","_type":"localeString"},"vendor-implementations":{"_type":"localeString","en":"Produced deployments","ru":"Производимые внедрения"},"supplier-implementations":{"_type":"localeString","en":"Supplied deployments","ru":"Поставляемые внедрения"},"show-all":{"_type":"localeString","en":"Show all","ru":"Показать все"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"schedule-event":{"_type":"localeString","en":"Events schedule","ru":"Pасписание событий"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"register":{"en":"Register","ru":"Регистрация ","_type":"localeString"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"auth-message":{"ru":"Для просмотра ивентов компании авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To view company events please log in or register on the sit."},"company-presentation":{"ru":"Презентация компании","_type":"localeString","en":"Company presentation"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"en":"Log in","de":"Einloggen","ru":"Вход","_type":"localeString"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"_type":"localeString","en":"Requests","de":"References","ru":"Мои запросы"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"en":"ROI calculators","ru":"ROI калькуляторы","_type":"localeString"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"en":"My profile","ru":"Мои данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"_type":"localeString","en":"Infocenter","de":"Infocenter","ru":"Инфоцентр"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"en":"Salestools","de":"Salestools","ru":"Salestools","_type":"localeString"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"_type":"localeString","en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"_type":"localeString","en":"Position","ru":"Должность"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"en":"Your rate","ru":"Ваша оценка","_type":"localeString"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"company":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"company":{"title":{"en":"ROI4CIO: Company","ru":"ROI4CIO: Компания","_type":"localeString"},"meta":[{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"},{"name":"og:type","content":"website"}],"translatable_meta":[{"translations":{"en":"Company","ru":"Компания","_type":"localeString"},"name":"title"},{"name":"description","translations":{"ru":"Описание компании","_type":"localeString","en":"Company description"}},{"name":"keywords","translations":{"en":"Company keywords","ru":"Ключевые слова для компании","_type":"localeString"}}]}},"pageMetaDataStatus":{"company":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{"skrytyi-postavshchik":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[{"id":2,"type":"supplier"}],"description":" Supplier Information is confidential ","companyTypes":["supplier"],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[{"id":591,"title":"ABBYY FlexiCapture for an international consulting company","description":"<span style=\"font-style: italic; \">“Amidst the continuously growing data flow, it is important for PwC to always keep its finger on the pulse, and process available information in a most efficient way. During an audit - every detail matters, every document, and every number therein contained. This opportunity to automate and enhance the accuracy of primary documents handling through ABBYY technologies enabled our team to complete routine tasks much easier and quicker, and, what is most important, to focus on more</span><span style=\"font-style: italic;\">top-priority and complex business processes and client communication.” — Sergey Shaleniy, PwC Regional Printing and Digitalization Service Leader</span>\r\nHow to Speed up Document Processing Auditing requires processing large troves of supporting documents and verifying that their content correctly correlates with the information in the PwC customer’s accounting system.\r\nPreviously, PwC employees manually keyed in data from source financial documents into systems. This required them to analyze every document for vital information, and hand-key these data fields into the registry. To increase the processing efficiency of primary financial documents and to automatically transfer data into working documents, PwC management decided to implement ABBYY® FlexiCapture® intelligent solution for automated data capture and document processing.\r\nIt enables much faster data transfer from contracts, invoices, payment orders, and other\r\ntypes of structured and unstructured documents, increasing the overall efficiency of document-driven business processes across an enterprise.\r\n<span style=\"font-weight: bold;\">How It Works</span>\r\nWhen a PwC employee uploads batches of scanned documents to ABBYY server, ABBYY FlexiCapture automatically:\r\n1. enhances document images and identifies document types\r\n2. identifies which of these documents are to be processed (OCRed), and extracts only required data (according to the user-defined rules)\r\n3. transfers the extracted information into a master spreadsheet.\r\nThus, the employee obtains the information needed for auditing and supporting records in a quick and convenient manner.\r\n<span style=\"font-weight: bold;\">Document Processing Is Easier and Faster</span>\r\nIn one of the pilot projects at the early implementation stage with PwC, FlexiCapture extracted data from more than 1,000 primary financial documents and verified it against post-transaction data in the PwC client’s accounting system. In addition, dynamic templates for identifying and extracting data from consignment notes and payment orders were developed and tested. The processing speed varies depending on the type of document, its complexity and the quality of a scanned copy.\r\nWith the ABBYY FlexiCapture solution, the PwC auditors invest their time more efficiently and perform high-priority tasks, while significantly enhancing data entry from clients’ source documents into the registry. Now the PwC specialists spend more time with their clients as they increase customer satisfaction, instead of wasting time inputting data by hand.","alias":"abbyy-flexicapture-for-an-international-consulting-company","roi":0,"seo":{"title":"ABBYY FlexiCapture for an international consulting company","keywords":"","description":"<span style=\"font-style: italic; \">“Amidst the continuously growing data flow, it is important for PwC to always keep its finger on the pulse, and process available information in a most efficient way. During an audit - every detail matters, every document, an","og:title":"ABBYY FlexiCapture for an international consulting company","og:description":"<span style=\"font-style: italic; \">“Amidst the continuously growing data flow, it is important for PwC to always keep its finger on the pulse, and process available information in a most efficient way. During an audit - every detail matters, every document, an"},"deal_info":"","user":{"id":1308,"title":"PwC","logoURL":"https://old.roi4cio.com/uploads/roi/company/PwC.png","alias":"pwc","address":"","roles":[],"description":"With offices in 157 countries and more than 208,000 people, we are among the leading professional services networks in the world. We help organisations and individuals create the value they’re looking for, by delivering quality in assurance, tax and advisory services. Some facts about PwC:\r\n\r\nIn FY15, PwC firms provided services to 418 companies in the Fortune Global 500 and 443 in the FT Global 500\r\nIn 2015, we were named the 2nd most attractive employer in the world for business students by Universum\r\nFor the year ending 30 June 2015, PwC’s gross revenues were US$35.4 billion, up 10%, a strong performance in the face of some challenging circumstances.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.pwc.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"PwC","keywords":"services, Global, world, 2015, were, Universum, students, business","description":"With offices in 157 countries and more than 208,000 people, we are among the leading professional services networks in the world. We help organisations and individuals create the value they’re looking for, by delivering quality in assurance, tax and advisory s","og:title":"PwC","og:description":"With offices in 157 countries and more than 208,000 people, we are among the leading professional services networks in the world. We help organisations and individuals create the value they’re looking for, by delivering quality in assurance, tax and advisory s","og:image":"https://old.roi4cio.com/uploads/roi/company/PwC.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":2060,"title":"ABBYY","logoURL":"https://old.roi4cio.com/uploads/roi/company/abbyy_logo.png","alias":"abbyy","address":"","roles":[],"description":"ABBYY is an international software company that provides optical character recognition, document capture and language software for both PC and mobile devices.\r\n\r\nThe majority of ABBYY products, such as ABBYY FineReader, are intended to simplify converting paper documents to digital data. ABBYY also provides language-based software products and services.\r\n\r\nSource: https://en.wikipedia.org/wiki/ABBYY","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"www.abbyy.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ABBYY","keywords":"ABBYY, software, products, provides, documents, converting, paper, intended","description":"ABBYY is an international software company that provides optical character recognition, document capture and language software for both PC and mobile devices.\r\n\r\nThe majority of ABBYY products, such as ABBYY FineReader, are intended to simplify converting pap","og:title":"ABBYY","og:description":"ABBYY is an international software company that provides optical character recognition, document capture and language software for both PC and mobile devices.\r\n\r\nThe majority of ABBYY products, such as ABBYY FineReader, are intended to simplify converting pap","og:image":"https://old.roi4cio.com/uploads/roi/company/abbyy_logo.png"},"eventUrl":""}],"products":[{"id":478,"logo":false,"scheme":false,"title":"ABBYY FlexiCapture","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"abbyy-flexicapture","companyTypes":[],"description":"ABBYY FlexiCapture is a powerful data capture and document processing solution from a world-leading technology vendor. It is designed to transform streams of documents of any structure and complexity into business-ready data. And its award-winning recognition technologies, automatic document classification, plus a highly scalable and customizable architecture, mean that it can help companies and organizations of any size to streamline their business processes, increase efficiency and reduce costs.\r\nTransform streams of documents of any structure and complexity into business-ready data\r\nCapture With Mobile\r\nABBYY FlexiCapture for iOS turns smartphones into portable scanners that capture information from paper documents and deliver it to back-end systems.\r\nSoftware for Document-driven Business Processes\r\nOne system for processing all kinds of paper documents in any industry\r\nIntelligent Auto-learning Technology Makes Set Up Easy\r\nInteractive training technology simplifies system implementation and set up.\r\nMobile Document Capture\r\nFlexiCapture’s mobile capture client provides an alternative entry point for documents – usable at anytime, from anywhere.\r\nWhat is Forms Processing?\r\nForms processing is a process whereby information entered into data fields is converted into electronic form. Automated form processing software interprets machine-print (OCR), isolated handprint (ICR), mark sense (OMR) and barcodes from paper forms. \r\nProduct History\r\nThe development of ABBYY data capture products started in 1995. At that time the team was working on two projects: the development of hand-written form recognition and FlexiCapture technology - which enables data extraction from documents with flexible layouts.","shortDescription":"ABBYY FlexiCapture - Capture data from any documents, from structured forms and surveys to unstructured text-heavy papers.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ABBYY FlexiCapture","keywords":"data, documents, from, into, ABBYY, capture, FlexiCapture, processing","description":"ABBYY FlexiCapture is a powerful data capture and document processing solution from a world-leading technology vendor. It is designed to transform streams of documents of any structure and complexity into business-ready data. And its award-winning recognition ","og:title":"ABBYY FlexiCapture","og:description":"ABBYY FlexiCapture is a powerful data capture and document processing solution from a world-leading technology vendor. It is designed to transform streams of documents of any structure and complexity into business-ready data. And its award-winning recognition "},"eventUrl":"","translationId":478,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":184,"title":"OCR - Optical character recognition","alias":"ocr-optical-character-recognition","description":"<span style=\"font-weight: bold; \">Optical character recognition</span> (optical character reader, OCR) is the mechanical or electronic conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo (for example the text on signs and billboards in a landscape photo) or from subtitle text superimposed on an image (for example from a television broadcast). The basic process of OCR involves examining the text of a document and translating the characters into code that can be used for data processing. OCR is sometimes also referred to as <span style=\"font-weight: bold; \">text recognition.</span>\r\nIt is widely used as a form of data entry from printed paper data records, whether passport documents, invoices, bank statements, computerised receipts, business cards, mail, printouts of static-data, or any suitable documentation. OCR program works best on text that has already been typed, either in cases where an original printout has been lost, or in scanning sheets typed on a typewriter. Good OCR software may also be able to translate handwritten text, however, although the error rate on this sort of conversion tends to be much higher.\r\nThe actual term OCR software is a bit misleading, as most modern versions do not in fact use optical character recognition, but actually use digital character recognition. This is because some years ago the fields effectively merged, and both fields adopted the more attractive term optical character recognition. Character recognition software has advanced a great deal in recent years, with modern programs substantially better than their predecessors at identifying text.\r\n<span style=\"color: rgb(97, 97, 97); \">OCR systems are made up of a combination of hardware and software that is used to convert physical documents into machine-readable text. Hardware, such as an optical scanner or specialized circuit board is used to copy or read text while optical recognition software typically handles the advanced processing. OCR technology software can also take advantage of artificial intelligence (AI) to implement more advanced methods of intelligent character recognition (ICR), like identifying languages or styles of handwriting.</span> \r\nThe process of OCR is most commonly used to turn hard copy legal or historic documents into PDFs. Once placed in this soft copy, users can edit, format and search the document as if it was created with a word processor.\r\nThe <span style=\"font-weight: bold; \">first step of OCR</span> is using a scanner to process the physical form of a document. Once all pages are copied, optical character recognition software converts the document into a two-color, or black and white, version. The scanned-in image or bitmap is analyzed for light and dark areas, where the dark areas are identified as characters that need to be recognized and light areas are identified as background.\r\nThe dark areas are then processed further to find alphabetic letters or numeric digits. OCR products can vary in their techniques, but typically involve targeting one character, word or block of text at a time. Characters are then identified using one of two algorithms:\r\n<span style=\"font-weight: bold; \">Pattern recognition</span> - OCR<span style=\"font-size:10pt; font-family:Arial; font-style:normal; \">recognition</span>programs are fed examples of text in various fonts and formats which are then used to compare, and recognize, characters in the scanned document.\r\n<span style=\"font-weight: bold; \">Feature detection</span> - OCR programs apply rules regarding the features of a specific letter or number to recognize characters in the scanned document. Features could include the number of angled lines, crossed lines or curves in a character for comparison. For example, the capital letter “A” may be stored as two diagonal lines that meet with a horizontal line across the middle.\r\nWhen a character is identified, it is <span style=\"font-weight: bold; \">converted into an ASCII code</span> that can be used by computer systems to handle further manipulations. Users should correct basic errors, proofread and make sure complex layouts were handled properly before saving the document for future use.","materialsDescription":"<h1 class=\"align-center\"> OCR (Optical Character Recognition) use cases</h1>\r\n<p class=\"align-center\">Uses of OCR have a variety of applications, including:</p>\r\n<ul><li>Scanning printed documents into versions that can be edited with word processors, like Microsoft Word or Google Docs.</li><li>Indexing print material for search engines.</li><li>Automating data entry, extraction and processing.</li><li>Deciphering documents into text that can be read aloud to visually-impaired or blind users.</li><li>Archiving historic information, such as newspapers, magazines or phonebooks, into searchable formats.</li><li>Electronically depositing checks without the need for a bank teller.</li><li>Placing important, signed legal documents into an electronic database.</li><li>Recognizing text, such as license plates, with a camera or software.</li><li>Sorting letters for mail delivery.</li><li>Translating words within an image into a specified language.</li></ul>\r\n<h1 class=\"align-center\">Choosing the Right Character Recognition Solution: OCR and ICR</h1>\r\nThough recent technology advancements improved data recognition, many offices continue to rely on manual entry and sorting processes. OCR (Optical Character Recognition) and ICR (Intelligent Character Recognition or Intelligent Document Recognition software) are essential components of Advanced Data Capture that digitally capture images and text. Both technologies provide companies with enhanced images and critical business information. So, what are the differences between OCR and ICR, and how do these differences pertain to your documents? \r\n<span style=\"font-weight: bold; \">Optical Character Recognition</span> refers to the process where documents are captured and digitally converted into searchable text that you can edit. OCR is primarily used to read machine-generated documents with typed or printed text. The technology reads brightness and text font of these documents, recognizing characters with utmost accuracy. OCR is a perfect solution for companies that need information from paper documents and PDF files, and is great for translating longer documents. For example, if you need to pull quotes from a document for another project, OCR will allow you to easily search, retrieve and extract text.\r\n<span style=\"font-weight: bold; \">Intelligent Character Recognition</span>, takes OCR a step further with more intensive character recognition. While OCR mainly encompasses machine-printed characters, the best of best intelligent character recognition software can recognize handwritten text, and translate them into searchable files. Like OCR, ICR scans, reviews and translates the text. ICR is a compatible solution for offices with many checks, timesheets and other handwritten documents.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/OCR_-_Optical_character_recognition.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":7,"title":"Improve Customer Service"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":177,"title":"Decentralized IT systems"},{"id":370,"title":"No automated business processes"},{"id":376,"title":"Unstructured data"},{"id":399,"title":"No e-document flow"}]}},"categories":[{"id":184,"title":"OCR - Optical character recognition","alias":"ocr-optical-character-recognition","description":"<span style=\"font-weight: bold; \">Optical character recognition</span> (optical character reader, OCR) is the mechanical or electronic conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo (for example the text on signs and billboards in a landscape photo) or from subtitle text superimposed on an image (for example from a television broadcast). The basic process of OCR involves examining the text of a document and translating the characters into code that can be used for data processing. OCR is sometimes also referred to as <span style=\"font-weight: bold; \">text recognition.</span>\r\nIt is widely used as a form of data entry from printed paper data records, whether passport documents, invoices, bank statements, computerised receipts, business cards, mail, printouts of static-data, or any suitable documentation. OCR program works best on text that has already been typed, either in cases where an original printout has been lost, or in scanning sheets typed on a typewriter. Good OCR software may also be able to translate handwritten text, however, although the error rate on this sort of conversion tends to be much higher.\r\nThe actual term OCR software is a bit misleading, as most modern versions do not in fact use optical character recognition, but actually use digital character recognition. This is because some years ago the fields effectively merged, and both fields adopted the more attractive term optical character recognition. Character recognition software has advanced a great deal in recent years, with modern programs substantially better than their predecessors at identifying text.\r\n<span style=\"color: rgb(97, 97, 97); \">OCR systems are made up of a combination of hardware and software that is used to convert physical documents into machine-readable text. Hardware, such as an optical scanner or specialized circuit board is used to copy or read text while optical recognition software typically handles the advanced processing. OCR technology software can also take advantage of artificial intelligence (AI) to implement more advanced methods of intelligent character recognition (ICR), like identifying languages or styles of handwriting.</span> \r\nThe process of OCR is most commonly used to turn hard copy legal or historic documents into PDFs. Once placed in this soft copy, users can edit, format and search the document as if it was created with a word processor.\r\nThe <span style=\"font-weight: bold; \">first step of OCR</span> is using a scanner to process the physical form of a document. Once all pages are copied, optical character recognition software converts the document into a two-color, or black and white, version. The scanned-in image or bitmap is analyzed for light and dark areas, where the dark areas are identified as characters that need to be recognized and light areas are identified as background.\r\nThe dark areas are then processed further to find alphabetic letters or numeric digits. OCR products can vary in their techniques, but typically involve targeting one character, word or block of text at a time. Characters are then identified using one of two algorithms:\r\n<span style=\"font-weight: bold; \">Pattern recognition</span> - OCR<span style=\"font-size:10pt; font-family:Arial; font-style:normal; \">recognition</span>programs are fed examples of text in various fonts and formats which are then used to compare, and recognize, characters in the scanned document.\r\n<span style=\"font-weight: bold; \">Feature detection</span> - OCR programs apply rules regarding the features of a specific letter or number to recognize characters in the scanned document. Features could include the number of angled lines, crossed lines or curves in a character for comparison. For example, the capital letter “A” may be stored as two diagonal lines that meet with a horizontal line across the middle.\r\nWhen a character is identified, it is <span style=\"font-weight: bold; \">converted into an ASCII code</span> that can be used by computer systems to handle further manipulations. Users should correct basic errors, proofread and make sure complex layouts were handled properly before saving the document for future use.","materialsDescription":"<h1 class=\"align-center\"> OCR (Optical Character Recognition) use cases</h1>\r\n<p class=\"align-center\">Uses of OCR have a variety of applications, including:</p>\r\n<ul><li>Scanning printed documents into versions that can be edited with word processors, like Microsoft Word or Google Docs.</li><li>Indexing print material for search engines.</li><li>Automating data entry, extraction and processing.</li><li>Deciphering documents into text that can be read aloud to visually-impaired or blind users.</li><li>Archiving historic information, such as newspapers, magazines or phonebooks, into searchable formats.</li><li>Electronically depositing checks without the need for a bank teller.</li><li>Placing important, signed legal documents into an electronic database.</li><li>Recognizing text, such as license plates, with a camera or software.</li><li>Sorting letters for mail delivery.</li><li>Translating words within an image into a specified language.</li></ul>\r\n<h1 class=\"align-center\">Choosing the Right Character Recognition Solution: OCR and ICR</h1>\r\nThough recent technology advancements improved data recognition, many offices continue to rely on manual entry and sorting processes. OCR (Optical Character Recognition) and ICR (Intelligent Character Recognition or Intelligent Document Recognition software) are essential components of Advanced Data Capture that digitally capture images and text. Both technologies provide companies with enhanced images and critical business information. So, what are the differences between OCR and ICR, and how do these differences pertain to your documents? \r\n<span style=\"font-weight: bold; \">Optical Character Recognition</span> refers to the process where documents are captured and digitally converted into searchable text that you can edit. OCR is primarily used to read machine-generated documents with typed or printed text. The technology reads brightness and text font of these documents, recognizing characters with utmost accuracy. OCR is a perfect solution for companies that need information from paper documents and PDF files, and is great for translating longer documents. For example, if you need to pull quotes from a document for another project, OCR will allow you to easily search, retrieve and extract text.\r\n<span style=\"font-weight: bold; \">Intelligent Character Recognition</span>, takes OCR a step further with more intensive character recognition. While OCR mainly encompasses machine-printed characters, the best of best intelligent character recognition software can recognize handwritten text, and translate them into searchable files. Like OCR, ICR scans, reviews and translates the text. ICR is a compatible solution for offices with many checks, timesheets and other handwritten documents.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/OCR_-_Optical_character_recognition.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://static4.abbyy.com/abbyycommedia/14686/case-studies-pwc-professional-services-financial-document-processing-en.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":593,"title":"ABBYY Real-Time Recognition SDK and ABBYY Mobile Imaging SDK for bank","description":"<span style=\"font-weight: bold;\">Challenge</span>\r\n• Make payment of bills more convenient and faster for business customers\r\n• Increase customer loyalty\r\n<span style=\"font-weight: bold;\">Solution</span>\r\nABBYY Mobile Imaging SDK and ABBYY\r\nMobile OCR Engine developer toolkits with advanced optical text recognition technologies.\r\n<span style=\"font-weight: bold;\">Results</span>\r\n• Reduced time on payment order creation\r\n• Decreased errors during data entry\r\nToday the Bank serves more than 1 million businesses and more than 35% of them are small and medium-sized companies. The mobile application for the self-service Sberbank Business Online (SBO) web portal has about 90,000 active users. The bank’s corporate customers often receive bills in paper form. Manually transferring data from bills into the mobile app or the remote banking website is both long and labor intensive. So Sberbank decided to automate this process.\r\n<span style=\"font-style: italic;\">“One of the important technological trends today in the financial sector is mobile banking. The main advantage of such solutions is that a client spends a minimum of time on routine tasks, which means they are satisfied working with the bank and return for new services. We will continue to develop this mobile channel of Sberbank Business Online website to ensure the maximum convenience of use, by taking into account specific needs of business owners.” - Mikhail Malakhov, Director of Remote Service ChannelsDevelopment at Sberbank</span>\r\n<span style=\"font-weight: bold;\">Recognition in a smartphone</span>\r\nABBYY Mobile Imaging SDK and ABBYY Mobile OCR Engine were chosen as the main tools for automating the creation of new payment orders. These developer tools enable the implementation of powerful algorithms for image processing and text recognition into mobile devices, combining high performance with low-level device resource utilization. ABBYY technologies allow the device to determine the quality of images — and can even improve it — before proceeding to recognize the text and extract the necessary data from snapshots.\r\nMaking payments by photo In the mobile SBO app, a business person takes a picture of a bill, and the payment order is generated automatically. The only thing left is to verify the correctness of the data. This feature is available in the full version of the bank’s application for iPhone and Android, which helps entrepreneurs and accountants save considerable time while working with bills.\r\nThe entire process takes place directly in the application, without connecting to the internet. Such an algorithm prevents overloading the server capacity of Sberbank, which is especially important for over 1 million corporate clients who process their bills monthly.\r\nOnly registered users can leverage all the features of the SBO bill recognition mobile app.\r\nIn demo mode, data recognition capabilities are not fully available","alias":"abbyy-real-time-recognition-sdk-and-abbyy-mobile-imaging-sdk-for-bank","roi":0,"seo":{"title":"ABBYY Real-Time Recognition SDK and ABBYY Mobile Imaging SDK for bank","keywords":"","description":"<span style=\"font-weight: bold;\">Challenge</span>\r\n• Make payment of bills more convenient and faster for business customers\r\n• Increase customer loyalty\r\n<span style=\"font-weight: bold;\">Solution</span>\r\nABBYY Mobile Imaging SDK and ABBYY\r\nMobile OCR Engine d","og:title":"ABBYY Real-Time Recognition SDK and ABBYY Mobile Imaging SDK for bank","og:description":"<span style=\"font-weight: bold;\">Challenge</span>\r\n• Make payment of bills more convenient and faster for business customers\r\n• Increase customer loyalty\r\n<span style=\"font-weight: bold;\">Solution</span>\r\nABBYY Mobile Imaging SDK and ABBYY\r\nMobile OCR Engine d"},"deal_info":"","user":{},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":2060,"title":"ABBYY","logoURL":"https://old.roi4cio.com/uploads/roi/company/abbyy_logo.png","alias":"abbyy","address":"","roles":[],"description":"ABBYY is an international software company that provides optical character recognition, document capture and language software for both PC and mobile devices.\r\n\r\nThe majority of ABBYY products, such as ABBYY FineReader, are intended to simplify converting paper documents to digital data. ABBYY also provides language-based software products and services.\r\n\r\nSource: https://en.wikipedia.org/wiki/ABBYY","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":2,"vendorPartnersCount":0,"supplierPartnersCount":2,"b4r":0,"categories":{},"companyUrl":"www.abbyy.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"ABBYY","keywords":"ABBYY, software, products, provides, documents, converting, paper, intended","description":"ABBYY is an international software company that provides optical character recognition, document capture and language software for both PC and mobile devices.\r\n\r\nThe majority of ABBYY products, such as ABBYY FineReader, are intended to simplify converting pap","og:title":"ABBYY","og:description":"ABBYY is an international software company that provides optical character recognition, document capture and language software for both PC and mobile devices.\r\n\r\nThe majority of ABBYY products, such as ABBYY FineReader, are intended to simplify converting pap","og:image":"https://old.roi4cio.com/uploads/roi/company/abbyy_logo.png"},"eventUrl":""}],"products":[{"id":2675,"logo":false,"scheme":false,"title":"ABBYY Mobile Imaging SDK II","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"abbyy-mobile-imaging-sdk-ii","companyTypes":[],"description":"Create apps that transform mobile devices into high-quality front-end data capture solutions. Reduce manual interaction for users, save on development resources and optimize your back-end processes with ABBYY Mobile Imaging SDK II.\r\n<span style=\"font-weight: bold;\">Available for iOS and Android</span>\r\n<ul><li>Fast image capture - Save your end users time and resources. Create apps that reduce manual interaction and capture the best quality images for OCR.</li><li>Front-end mobile data capture solution - Increase your apps’ productivity. Power up your mobile apps with a front-end mobile data capture solution that can easily integrate into your back-end systems.</li><li>Pre-built comprehensive image capture solution - Optimize your development resources. Easily integrate a pre-built comprehensive image capture solution into your mobile app.</li></ul>\r\n<span style=\"font-weight: bold;\">Key features</span>\r\n<ul><li>Automatic photo capture. Automatically captures the best quality image suitable for OCR by hovering the smartphone’s camera over the document, minimizing manual image verification.</li><li>Document detection. This new feature automatically finds the boundaries of the document in a video stream or photo and crops the image and corrects its perspective.</li><li>New API. The new and optimized API, with high level methods for image capturing, saves you development time. In additional, it supports common programming languages used for mobile application development.</li><li>Image export. Improved export functionality provides you the flexibility to choose between different image export formats (PDF, JPEG, JPEG2000, PNG) and compression levels for further back-end processing.</li></ul>","shortDescription":"ABBYY Mobile Imaging SDK II is a high-quality front-end data capture solution. Reduce manual interaction for users, save on development resources and optimize your back-end processes","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ABBYY Mobile Imaging SDK II","keywords":"","description":"Create apps that transform mobile devices into high-quality front-end data capture solutions. Reduce manual interaction for users, save on development resources and optimize your back-end processes with ABBYY Mobile Imaging SDK II.\r\n<span style=\"font-weight: b","og:title":"ABBYY Mobile Imaging SDK II","og:description":"Create apps that transform mobile devices into high-quality front-end data capture solutions. Reduce manual interaction for users, save on development resources and optimize your back-end processes with ABBYY Mobile Imaging SDK II.\r\n<span style=\"font-weight: b"},"eventUrl":"","translationId":2675,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":146,"title":"ECM - Enterprise Content Management","alias":"ecm-enterprise-content-management","description":"<span style=\"font-weight: bold; \">Enterprise content management (ECM)</span> extends the concept of content management by adding a time line for each content item and possibly enforcing processes for the creation, approval and distribution of them. Systems that implement ECM generally provide a secure repository for managed items, be they analog or digital, that indexes them. They also include one or more methods for importing content to bring new items under management and several presentation methods to make items available for use. The key feature of ECM that distinguishes it from "simple" content management is that an ECM is at least cognizant of the processes and procedures of the enterprise it is created for, and as such is particular to it. \r\nECM as an umbrella term covers enterprise document management system, Web content management, search, collaboration, records management, digital asset management (DAM), workflow management, capture and scanning. ECM is primarily aimed at managing the life-cycle of information from initial publication or creation all the way through archival and eventual disposal. ECM enterprise content management software is delivered in four ways:\r\n- on-premises software (installed on an organization's own network)\r\n- software as a service (SaaS) (Web access to information that is stored on a software manufacturer's system)\r\n- a hybrid composed of both on-premises and SaaS components\r\n- Infrastructure as a Service (IaaS) (which refers to online services that abstract the user from the details of infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc.)\r\n<span style=\"font-weight: bold;\">ECM provides</span> a centralized platform where content can be held and disseminated in a manner that meets regulatory compliance requirements and risk management guidelines. An ECM achieves the latter two benefits by eliminating ad hoc processes that can expose an enterprise to regulatory compliance risks and other potential problems. Full-function enterprise content management solutions include features such as content taxonomies, auditing capabilities, check-in/check-out and other workflow controls and security mechanisms.\r\nAn <span style=\"font-weight: bold;\">effective ECM </span>can streamline access and business processes, eliminate bottlenecks by reducing storage, as well as paper and mailing needs, optimize security, maintain integrity and minimize overhead. All of these can lead to increased productivity. The first step is to document all the types of content that the organization deals with, the business processes its part of and who handles the content. \r\nECM software can be used to identify duplicate and near-duplicate content, allowing the organization to keep a few copies of a particular piece of content instead of hundreds. The best ECM software extends the reach of traditional ECM capabilities into previously isolated applications and information silos, such as ERP, CRM, SCM and HCM, to take the shape of a content services platform. Information can now flow across the enterprise to the people and processes—when, where and in whatever context it is needed.\r\nTo understand more specific ways it could help your company, consider these <span style=\"font-weight: bold; \">three types of ECM</span> software solutions.\r\n<span style=\"font-weight: bold; \">Web Content Management.</span> WCM puts control over the look and feel of a website in the hands of specific, key people. It’s used by organizations with relatively complex websites and strict brand guidelines, giving those key personnel the means to easily update, modify and publish content for the sites while adhering to the guidelines.\r\n<span style=\"font-weight: bold; \">Collaborative Content Management.</span> CCM enables multiple people to access and modify a single document, such as a legal document. It’s ideal for organizations that must manage projects involving multiple stakeholders. CCM makes it easy to work together while keeping track of, and updating, the most-current version of the document.\r\n<span style=\"font-weight: bold; \">Transactional Content Management.</span> This type of ECM document management is designed for organizations that repeatedly use varied types of content, including records, paper documents, and digital files. TCM solutions capture content from various channels, classify it, store it, create an automated workflow to ensure the right user receives the content at the right time, and even deletes documents when they’re no longer needed, all while working seamlessly with other apps and databases, ensuring all of that content is available throughout the company.<br /><br /><br />\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: bold; \">What is Enterprise Content Management (ECM)?</span></h1>\r\nEnterprise Content Management is the organization of structured and unstructured documents using technology and software that allows your organization to “work smarter, not harder.” As technology advanced and everything became digital, organizations needed a new way to store and access files, leading to the creation of ECM. \r\nECM document management system consists of four main points:\r\n<ul><li><span style=\"font-weight: bold; \">Capture:</span> Capturing information from hardcopy documents or online forms and transferring it into the system</li><li><span style=\"font-weight: bold; \">Manage:</span> Managing the captured data in a structured format that allows quick and easy retrieval</li><li><span style=\"font-weight: bold; \">Storing:</span> Securely storing files in a central repository that can be accessed from multiple locations</li><li><span style=\"font-weight: bold; \">Delivery:</span> Implementation of business process workflows to automatically move documents from one step to the next</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Five ways ECM software can benefit your organization</span></h1>\r\n<span style=\"font-weight: bold; \">Basic file sharing and library services.</span> At its core, enterprise document management software begins with basic file sharing and library services managed within a networked repository. Individuals and groups with predefined access rights and permissions can access the repository and then create, read, update and delete files stored within it.\r\nMany ECM applications support Content Management Interoperability Services, an industry standard that allows different vendors' products to interoperate; this is an essential capability within large enterprises that maintain content management tools from multiple vendors.\r\n<span style=\"font-weight: bold; \">Content governance, compliance and records management.</span> For many organizations, managing business documents or other content types is a critical use case for ECM. Companies subject to compliance or other industry regulations need document content management system software to capture, manage, archive and ultimately dispose of files after a predefined period.\r\nECM can ensure that only individuals with predefined permissions - determined by access controls - can update or view documents stored within a repository. An organization can thus manage document modification.\r\nIn addition, enterprise content management tools can log all actions, providing an organization with the capabilities to maintain an auditable record of all the changes to documents within the repository.\r\n<span style=\"font-weight: bold; \">Business process management.</span> Companies also use ECM to establish workflows that span departments and geographies to support extended enterprise and inter-enterprise business processes.\r\nMost ECM software provides tools to help both technical and non-technical business users define business processes. Most applications provide audit controls to track each step of the process and analytic capabilities to help identify inefficiencies and streamline business procedures.\r\n<span style=\"font-weight: bold; \">Content repositories linked to other enterprise applications.</span> Some companies use electronic content management software as a repository for documents created by other enterprise applications, including CRM, ERP, HR and financial systems. These enterprise systems can seamlessly access, view or modify content managed by the ECM.\r\n<span style=\"font-weight: bold; \">Enabling mobile and remote workforces.</span> Content management tools often include functionality to allow remote workers to access content from mobile devices. This is an increasingly important feature for many companies.\r\nMobile capabilities also enable new kinds of data capture and presentation functionalities. By combining content management capabilities with other data, for example, a political canvasser can use a tablet to enter new information about a political donor without having to start from scratch, as some of that information is already stored in a content management system. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/ECM_-_Enterprise_Content_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":2677,"logo":false,"scheme":false,"title":"ABBYY Real-Time Recognition SDK","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"abbyy-real-time-recognition-sdk","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Why ABBYY Real-Time Recognition SDK?</span>\r\n<ul><li>Fast text input. Extracting text directly from the smartphone’s preview screen is significantly faster and more convenient than taking a picture of the text followed by an OCR step or entering the text manually.</li><li>Improved business performance. Real-time text capture from documents such as invoices, waybills, sick notes or letters can be quickly implemented into existing corporate apps in banks, transport companies, insurance, and other organizations.</li><li>Suitable for high security requirements. As the text does not need to be photographed, saved in the memory storage, uploaded to cloud services or external servers, this modern way of information capture is suitable for organizations with the highest data security standards.</li><li>Outstanding recognition accuracy. We have combined ABBYY’s proven OCR technology with new intelligent algorithms that recognize text from live video streams. This SDK technology ensures superior text recognition accuracy within apps for both businesses and consumers.</li></ul>\r\nReal-Time Recognition SDK can be integrated into mobile apps supporting various use cases. The integration of the development toolkit into a mobile app can significantly speed up mobile data capture processes in organizations, allow automated quality control in production companies and offer convenient data entry to users of smartphones and tablets.\r\n<span style=\"font-weight: bold;\">Use cases</span>\r\n<ul><li>Customer registration and on-boarding. By simply pointing the mobile device’s camera at ID cards, passports and other identification documents, customer data is transferred into company systems without the need to type them in.</li><li>Mobile payment. Information necessary for a money transfer can be inserted directly into the fields of a mobile banking app by focusing the smartphone’s camera on payment slips, invoices or other payment documents.</li><li>Customer self-service. Enterprise companies can increase customer satisfaction and loyalty by providing modern apps that allow clients to communicate easily and exchange data with their vendors.</li></ul>\r\n<span style=\"font-weight: bold;\">Key features</span>\r\n<ul><li>Specific data capture. When described by regular expressions, specific data fields can be automatically detected and extracted in real time. Requested information (for example, total amounts on invoices, email addresses or phone numbers on business cards, promotional codes on vouchers, or other data fields) can be obtained immediately, even if they are part of larger text areas.</li><li>Text detection from video stream and photo library. When pointing the smartphone’s camera at text, the technology is continuously recognizing the text from the ‘live’ video stream. This enables instant recognition of text on documents or objects without the need to take a picture. Also the capability to recognize text from images saved within the photo library of the mobile device.</li><li>63 OCR languages. Text recognition in 63 languages allows for the quick creation of mobile apps for international business organizations as well as consumer travel apps.</li></ul>\r\n<span style=\"font-weight: bold;\">See the full list of OCR languages</span>\r\n<ul><li>OCR for iOS and Android. Usage of toolkits from one OCR vendor leads to consistent functionality and comparable recognition results for both the iOS and Android platforms.</li><li>MRZ support and data capture from IDs. Built-in support for capturing MRZ information, coupled with the ability to capture personal information from ID documents such as passports, ID cards, driver’s licenses and other sources, helps create mobile apps with fast personal data entry and identity verification.</li><li>Text capture from objects. Text on objects such as street signs or license plates can now be easily captured. Intelligent algorithms enable quick text detection and produce highly accurate recognition results, even when the mobile device camera is in poor lighting and angle conditions.</li><li>Bank card recognition and IBAN capture. Built-in support for the detection and extraction of IBAN and bank card numbers opens up endless possibilities for mobile banking apps. With SDK integrated, smartphone cameras just focus on the IBAN code or bank card number, and the data is instantly detected and transferred into the mobile banking app.</li><li>Instant translation. Developers can create apps that instantly translate words viewed through smartphones or tablets in real time. The dictionaries with menu lexis and some general lexis are included and allow instant translation with no internet connection**. The translated text will replace the original text on the camera preview screen, giving the user a ‘real-live’ translation experience.</li><li>Highly accurate OCR results. The SDK is based on premium ABBYY text recognition technology, acknowledged by major software developers and used on 100M+ devices worldwide by enterprise companies, and ultimately consumers. </li></ul>","shortDescription":"ABBYY Real-Time Recognition SDK enables developers to add ‘instant’ text capture functionality to mobile apps: payment data on invoices, personal information on ID cards ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"ABBYY Real-Time Recognition SDK","keywords":"","description":"<span style=\"font-weight: bold;\">Why ABBYY Real-Time Recognition SDK?</span>\r\n<ul><li>Fast text input. Extracting text directly from the smartphone’s preview screen is significantly faster and more convenient than taking a picture of the text followed by an OC","og:title":"ABBYY Real-Time Recognition SDK","og:description":"<span style=\"font-weight: bold;\">Why ABBYY Real-Time Recognition SDK?</span>\r\n<ul><li>Fast text input. Extracting text directly from the smartphone’s preview screen is significantly faster and more convenient than taking a picture of the text followed by an OC"},"eventUrl":"","translationId":2677,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":146,"title":"ECM - Enterprise Content Management","alias":"ecm-enterprise-content-management","description":"<span style=\"font-weight: bold; \">Enterprise content management (ECM)</span> extends the concept of content management by adding a time line for each content item and possibly enforcing processes for the creation, approval and distribution of them. Systems that implement ECM generally provide a secure repository for managed items, be they analog or digital, that indexes them. They also include one or more methods for importing content to bring new items under management and several presentation methods to make items available for use. The key feature of ECM that distinguishes it from "simple" content management is that an ECM is at least cognizant of the processes and procedures of the enterprise it is created for, and as such is particular to it. \r\nECM as an umbrella term covers enterprise document management system, Web content management, search, collaboration, records management, digital asset management (DAM), workflow management, capture and scanning. ECM is primarily aimed at managing the life-cycle of information from initial publication or creation all the way through archival and eventual disposal. ECM enterprise content management software is delivered in four ways:\r\n- on-premises software (installed on an organization's own network)\r\n- software as a service (SaaS) (Web access to information that is stored on a software manufacturer's system)\r\n- a hybrid composed of both on-premises and SaaS components\r\n- Infrastructure as a Service (IaaS) (which refers to online services that abstract the user from the details of infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc.)\r\n<span style=\"font-weight: bold;\">ECM provides</span> a centralized platform where content can be held and disseminated in a manner that meets regulatory compliance requirements and risk management guidelines. An ECM achieves the latter two benefits by eliminating ad hoc processes that can expose an enterprise to regulatory compliance risks and other potential problems. Full-function enterprise content management solutions include features such as content taxonomies, auditing capabilities, check-in/check-out and other workflow controls and security mechanisms.\r\nAn <span style=\"font-weight: bold;\">effective ECM </span>can streamline access and business processes, eliminate bottlenecks by reducing storage, as well as paper and mailing needs, optimize security, maintain integrity and minimize overhead. All of these can lead to increased productivity. The first step is to document all the types of content that the organization deals with, the business processes its part of and who handles the content. \r\nECM software can be used to identify duplicate and near-duplicate content, allowing the organization to keep a few copies of a particular piece of content instead of hundreds. The best ECM software extends the reach of traditional ECM capabilities into previously isolated applications and information silos, such as ERP, CRM, SCM and HCM, to take the shape of a content services platform. Information can now flow across the enterprise to the people and processes—when, where and in whatever context it is needed.\r\nTo understand more specific ways it could help your company, consider these <span style=\"font-weight: bold; \">three types of ECM</span> software solutions.\r\n<span style=\"font-weight: bold; \">Web Content Management.</span> WCM puts control over the look and feel of a website in the hands of specific, key people. It’s used by organizations with relatively complex websites and strict brand guidelines, giving those key personnel the means to easily update, modify and publish content for the sites while adhering to the guidelines.\r\n<span style=\"font-weight: bold; \">Collaborative Content Management.</span> CCM enables multiple people to access and modify a single document, such as a legal document. It’s ideal for organizations that must manage projects involving multiple stakeholders. CCM makes it easy to work together while keeping track of, and updating, the most-current version of the document.\r\n<span style=\"font-weight: bold; \">Transactional Content Management.</span> This type of ECM document management is designed for organizations that repeatedly use varied types of content, including records, paper documents, and digital files. TCM solutions capture content from various channels, classify it, store it, create an automated workflow to ensure the right user receives the content at the right time, and even deletes documents when they’re no longer needed, all while working seamlessly with other apps and databases, ensuring all of that content is available throughout the company.<br /><br /><br />\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: bold; \">What is Enterprise Content Management (ECM)?</span></h1>\r\nEnterprise Content Management is the organization of structured and unstructured documents using technology and software that allows your organization to “work smarter, not harder.” As technology advanced and everything became digital, organizations needed a new way to store and access files, leading to the creation of ECM. \r\nECM document management system consists of four main points:\r\n<ul><li><span style=\"font-weight: bold; \">Capture:</span> Capturing information from hardcopy documents or online forms and transferring it into the system</li><li><span style=\"font-weight: bold; \">Manage:</span> Managing the captured data in a structured format that allows quick and easy retrieval</li><li><span style=\"font-weight: bold; \">Storing:</span> Securely storing files in a central repository that can be accessed from multiple locations</li><li><span style=\"font-weight: bold; \">Delivery:</span> Implementation of business process workflows to automatically move documents from one step to the next</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Five ways ECM software can benefit your organization</span></h1>\r\n<span style=\"font-weight: bold; \">Basic file sharing and library services.</span> At its core, enterprise document management software begins with basic file sharing and library services managed within a networked repository. Individuals and groups with predefined access rights and permissions can access the repository and then create, read, update and delete files stored within it.\r\nMany ECM applications support Content Management Interoperability Services, an industry standard that allows different vendors' products to interoperate; this is an essential capability within large enterprises that maintain content management tools from multiple vendors.\r\n<span style=\"font-weight: bold; \">Content governance, compliance and records management.</span> For many organizations, managing business documents or other content types is a critical use case for ECM. Companies subject to compliance or other industry regulations need document content management system software to capture, manage, archive and ultimately dispose of files after a predefined period.\r\nECM can ensure that only individuals with predefined permissions - determined by access controls - can update or view documents stored within a repository. An organization can thus manage document modification.\r\nIn addition, enterprise content management tools can log all actions, providing an organization with the capabilities to maintain an auditable record of all the changes to documents within the repository.\r\n<span style=\"font-weight: bold; \">Business process management.</span> Companies also use ECM to establish workflows that span departments and geographies to support extended enterprise and inter-enterprise business processes.\r\nMost ECM software provides tools to help both technical and non-technical business users define business processes. Most applications provide audit controls to track each step of the process and analytic capabilities to help identify inefficiencies and streamline business procedures.\r\n<span style=\"font-weight: bold; \">Content repositories linked to other enterprise applications.</span> Some companies use electronic content management software as a repository for documents created by other enterprise applications, including CRM, ERP, HR and financial systems. These enterprise systems can seamlessly access, view or modify content managed by the ECM.\r\n<span style=\"font-weight: bold; \">Enabling mobile and remote workforces.</span> Content management tools often include functionality to allow remote workers to access content from mobile devices. This is an increasingly important feature for many companies.\r\nMobile capabilities also enable new kinds of data capture and presentation functionalities. By combining content management capabilities with other data, for example, a political canvasser can use a tablet to enter new information about a political donor without having to start from scratch, as some of that information is already stored in a content management system. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/ECM_-_Enterprise_Content_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":7,"title":"Improve Customer Service"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":370,"title":"No automated business processes"},{"id":393,"title":"Complex and non-transparent business processes"},{"id":399,"title":"No e-document flow"}]}},"categories":[{"id":146,"title":"ECM - Enterprise Content Management","alias":"ecm-enterprise-content-management","description":"<span style=\"font-weight: bold; \">Enterprise content management (ECM)</span> extends the concept of content management by adding a time line for each content item and possibly enforcing processes for the creation, approval and distribution of them. Systems that implement ECM generally provide a secure repository for managed items, be they analog or digital, that indexes them. They also include one or more methods for importing content to bring new items under management and several presentation methods to make items available for use. The key feature of ECM that distinguishes it from "simple" content management is that an ECM is at least cognizant of the processes and procedures of the enterprise it is created for, and as such is particular to it. \r\nECM as an umbrella term covers enterprise document management system, Web content management, search, collaboration, records management, digital asset management (DAM), workflow management, capture and scanning. ECM is primarily aimed at managing the life-cycle of information from initial publication or creation all the way through archival and eventual disposal. ECM enterprise content management software is delivered in four ways:\r\n- on-premises software (installed on an organization's own network)\r\n- software as a service (SaaS) (Web access to information that is stored on a software manufacturer's system)\r\n- a hybrid composed of both on-premises and SaaS components\r\n- Infrastructure as a Service (IaaS) (which refers to online services that abstract the user from the details of infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc.)\r\n<span style=\"font-weight: bold;\">ECM provides</span> a centralized platform where content can be held and disseminated in a manner that meets regulatory compliance requirements and risk management guidelines. An ECM achieves the latter two benefits by eliminating ad hoc processes that can expose an enterprise to regulatory compliance risks and other potential problems. Full-function enterprise content management solutions include features such as content taxonomies, auditing capabilities, check-in/check-out and other workflow controls and security mechanisms.\r\nAn <span style=\"font-weight: bold;\">effective ECM </span>can streamline access and business processes, eliminate bottlenecks by reducing storage, as well as paper and mailing needs, optimize security, maintain integrity and minimize overhead. All of these can lead to increased productivity. The first step is to document all the types of content that the organization deals with, the business processes its part of and who handles the content. \r\nECM software can be used to identify duplicate and near-duplicate content, allowing the organization to keep a few copies of a particular piece of content instead of hundreds. The best ECM software extends the reach of traditional ECM capabilities into previously isolated applications and information silos, such as ERP, CRM, SCM and HCM, to take the shape of a content services platform. Information can now flow across the enterprise to the people and processes—when, where and in whatever context it is needed.\r\nTo understand more specific ways it could help your company, consider these <span style=\"font-weight: bold; \">three types of ECM</span> software solutions.\r\n<span style=\"font-weight: bold; \">Web Content Management.</span> WCM puts control over the look and feel of a website in the hands of specific, key people. It’s used by organizations with relatively complex websites and strict brand guidelines, giving those key personnel the means to easily update, modify and publish content for the sites while adhering to the guidelines.\r\n<span style=\"font-weight: bold; \">Collaborative Content Management.</span> CCM enables multiple people to access and modify a single document, such as a legal document. It’s ideal for organizations that must manage projects involving multiple stakeholders. CCM makes it easy to work together while keeping track of, and updating, the most-current version of the document.\r\n<span style=\"font-weight: bold; \">Transactional Content Management.</span> This type of ECM document management is designed for organizations that repeatedly use varied types of content, including records, paper documents, and digital files. TCM solutions capture content from various channels, classify it, store it, create an automated workflow to ensure the right user receives the content at the right time, and even deletes documents when they’re no longer needed, all while working seamlessly with other apps and databases, ensuring all of that content is available throughout the company.<br /><br /><br />\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: bold; \">What is Enterprise Content Management (ECM)?</span></h1>\r\nEnterprise Content Management is the organization of structured and unstructured documents using technology and software that allows your organization to “work smarter, not harder.” As technology advanced and everything became digital, organizations needed a new way to store and access files, leading to the creation of ECM. \r\nECM document management system consists of four main points:\r\n<ul><li><span style=\"font-weight: bold; \">Capture:</span> Capturing information from hardcopy documents or online forms and transferring it into the system</li><li><span style=\"font-weight: bold; \">Manage:</span> Managing the captured data in a structured format that allows quick and easy retrieval</li><li><span style=\"font-weight: bold; \">Storing:</span> Securely storing files in a central repository that can be accessed from multiple locations</li><li><span style=\"font-weight: bold; \">Delivery:</span> Implementation of business process workflows to automatically move documents from one step to the next</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Five ways ECM software can benefit your organization</span></h1>\r\n<span style=\"font-weight: bold; \">Basic file sharing and library services.</span> At its core, enterprise document management software begins with basic file sharing and library services managed within a networked repository. Individuals and groups with predefined access rights and permissions can access the repository and then create, read, update and delete files stored within it.\r\nMany ECM applications support Content Management Interoperability Services, an industry standard that allows different vendors' products to interoperate; this is an essential capability within large enterprises that maintain content management tools from multiple vendors.\r\n<span style=\"font-weight: bold; \">Content governance, compliance and records management.</span> For many organizations, managing business documents or other content types is a critical use case for ECM. Companies subject to compliance or other industry regulations need document content management system software to capture, manage, archive and ultimately dispose of files after a predefined period.\r\nECM can ensure that only individuals with predefined permissions - determined by access controls - can update or view documents stored within a repository. An organization can thus manage document modification.\r\nIn addition, enterprise content management tools can log all actions, providing an organization with the capabilities to maintain an auditable record of all the changes to documents within the repository.\r\n<span style=\"font-weight: bold; \">Business process management.</span> Companies also use ECM to establish workflows that span departments and geographies to support extended enterprise and inter-enterprise business processes.\r\nMost ECM software provides tools to help both technical and non-technical business users define business processes. Most applications provide audit controls to track each step of the process and analytic capabilities to help identify inefficiencies and streamline business procedures.\r\n<span style=\"font-weight: bold; \">Content repositories linked to other enterprise applications.</span> Some companies use electronic content management software as a repository for documents created by other enterprise applications, including CRM, ERP, HR and financial systems. These enterprise systems can seamlessly access, view or modify content managed by the ECM.\r\n<span style=\"font-weight: bold; \">Enabling mobile and remote workforces.</span> Content management tools often include functionality to allow remote workers to access content from mobile devices. This is an increasingly important feature for many companies.\r\nMobile capabilities also enable new kinds of data capture and presentation functionalities. By combining content management capabilities with other data, for example, a political canvasser can use a tablet to enter new information about a political donor without having to start from scratch, as some of that information is already stored in a content management system. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/ECM_-_Enterprise_Content_Management.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://static3.abbyy.com/abbyycommedia/15667/case-studies-sberbank-banking-finance-mobile-capture-bill-payment-en.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":489,"title":"Adobe Experience Cloud, Microsoft Dynamics 365 for 24 Hour Fitness","description":"<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \">Microsoft Corp. (Nasdaq: MSFT) and Adobe (Nasdaq: ADBE) on Wednesday announced an agreement with 24 Hour Fitness, one of the nation’s largest privately owned and operated fitness chains, to deploy Microsoft Dynamics 365 and Adobe Experience Cloud across its network of more than 420 clubs nationwide. This will enable 24 Hour Fitness to dramatically enhance its ability to offer more personalized and unified digital experiences for members throughout every touch point in their fitness journey. With technology integrations across Microsoft business applications and Adobe Experience Cloud, 24 Hour Fitness is investing in a combined cloud platform to engage its members and prospects with highly personalized experiences.</span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \"><br /></span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); font-style: italic; \">“We have an opportunity to establish a new bar across the industry by delivering personalized digital interactions to our members that are available 24 hours a day, at home, on the road or in the gym,” said Frank Napolitano, president, 24 Hour Fitness. “It’s not an easy feat to achieve this with nearly 4 million members. Adobe is empowering us to create mass consumer personalization that scales, all utilizing the Microsoft Dynamics 365 platform. In doing so, we are better positioned to serve our members the workouts and health and fitness guidance they truly want and need.”</span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \"><br /></span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \">24 Hour Fitness is undertaking a journey to digitally transform its operations by combining functional departments to provide a single view of members and guests, messaging, and performance. Integrated cloud solutions from Adobe and Microsoft will help 24 Hour Fitness with scale, security and outreach along with AI and machine learnings to streamline its business and connect more deliberately to its members.</span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \"><br /></span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); font-style: italic; \">“Adobe and Microsoft are at the center of how we bring in relevant data, draw intelligent insights, and then how we act upon those insights across all our channels holistically,” said Tom Lapcevic, executive vice president and chief marketing officer, 24 Hour Fitness. “Our mission is to help people improve their lives every day through fitness, both inside and outside our clubs. So, whether it be email communications with a member, a mobile push notification or an SMS communication, we make sure that all our channels are in sync with what the needs of that individual are. It’s about giving every one of our members and guests a better and more personalized experience — and ultimately the results they desire.”</span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \"><br /></span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \">24 Hour Fitness already leverages Adobe Campaign for email, SMS and mobile push messaging, and Adobe Target for personalization across channels. Integration with Microsoft Dynamics 365 for Sales will enable 24 Hour Fitness to leverage sales data for member and guest insights, providing a single view of the customer that can be used to personalize experiences. For example, 24 Hour Fitness can customize offers, such as personal training recommendations based on loyalty, interests and geography. In addition, the 24 Hour Fitness 24GO custom coaching platform, powered by Adobe Experience Manager for content management and delivery, combined with Microsoft Dynamics 365 provides custom workouts, at-home programming, progress and goal tracking, and class schedules — all within a single dashboard. As well, the monthly digital magazine 24Life offers experts to help you think, eat, move and recover better. </span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \"><br /></span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); font-style: italic; \">“24 Hour Fitness is at the forefront of delivering exceptional personalized customer experiences across new customer acquisition all the way through delivering ongoing member services,” said Alysa Taylor, general manager, Microsoft Business Applications & Industry Group. “Together with Adobe, we’re dedicated to empowering digital transformation with 24 Hour Fitness and are proud to join them in their efforts to develop amazing experiences that can revolutionize their industry and further engage their members.”</span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \"><br /></span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); font-style: italic; \">“Delivering personalization at scale is the holy grail when it comes to how fitness companies engage with members,” said Dave Welch, vice president, Microsoft Solutions, Adobe. “24 Hour Fitness is able to achieve precisely this by harnessing the unique advantages of Adobe and Microsoft’s joint solutions. This can be a game-changer that truly transforms the member experience.”</span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \"><br /></span>\r\n<p style=\"background-color: rgb(255, 255, 255); \"><span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \">At Adobe Summit 2018 last month, Microsoft and Adobe outlined new native technology integrations between Adobe Experience Manager and Microsoft Azure, Adobe Campaign and Microsoft Dynamics 365, and Adobe Analytics and Microsoft Power BI. The companies together serve more than 60 global brands today, empowering enterprises to compile customer insights, creating a single view of the customer that can be used to personalize experiences across marketing touchpoints. More information on these joint solutions can be found here.</span></p>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \"><br /></span>","alias":"adobe-experience-cloud-microsoft-dynamics-365-for-24-hour-fitness","roi":0,"seo":{"title":"Adobe Experience Cloud, Microsoft Dynamics 365 for Customer Engagement","keywords":"Adobe Experience Cloud, Microsoft Dynamics 365, Customer Engagement, Customer, Fitness, custom workouts, at-home programming, progress, goal tracking, class schedules, mobile push notification, SMS communication","description":"<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \">Microsoft Corp. (Nasdaq: MSFT) and Adobe (Nasdaq: ADBE) on Wednesday announced an agreement with 24 Hour Fitness, one of the nation’s largest privately owned and operated fi","og:title":"Adobe Experience Cloud, Microsoft Dynamics 365 for Customer Engagement","og:description":"<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \">Microsoft Corp. (Nasdaq: MSFT) and Adobe (Nasdaq: ADBE) on Wednesday announced an agreement with 24 Hour Fitness, one of the nation’s largest privately owned and operated fi"},"deal_info":"","user":{"id":4254,"title":"24 Hour Fitness","logoURL":"https://old.roi4cio.com/uploads/roi/company/24_Hour_Fitness.png","alias":"24-hour-fitness","address":"","roles":[],"description":"Headquartered in San Ramon, Calif., we are a leading fitness industry pioneer with nearly four million members in more than 400 clubs across the U.S. For more than 30 years, we’ve held fast to our mission of helping people improve their lives through fitness. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.24hourfitness.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"24 Hour Fitness","keywords":"than, fitness, more, years, we’ve, held, fast, across","description":"Headquartered in San Ramon, Calif., we are a leading fitness industry pioneer with nearly four million members in more than 400 clubs across the U.S. For more than 30 years, we’ve held fast to our mission of helping people improve their lives through fitness.&","og:title":"24 Hour Fitness","og:description":"Headquartered in San Ramon, Calif., we are a leading fitness industry pioneer with nearly four million members in more than 400 clubs across the U.S. For more than 30 years, we’ve held fast to our mission of helping people improve their lives through fitness.&","og:image":"https://old.roi4cio.com/uploads/roi/company/24_Hour_Fitness.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":181,"title":"Adobe","logoURL":"https://old.roi4cio.com/uploads/roi/company/adobe_logo.png","alias":"adobe","address":"","roles":[],"description":"Adobe Systems Incorporated is an American multinational computer software company. The company is headquartered in San Jose, California, United States. Adobe has historically focused upon the creation of multimedia and creativity software products, with a more recent foray towards rich Internet application software development. It is best known for Photoshop, an image editing software, Adobe Reader, the Portable Document Format (PDF) and Adobe Creative Suite, as well as its successor Adobe Creative Cloud.","companyTypes":[],"products":{},"vendoredProductsCount":7,"suppliedProductsCount":7,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":1,"vendorPartnersCount":0,"supplierPartnersCount":6,"b4r":1,"categories":{},"companyUrl":"https://www.adobe.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Adobe","keywords":"Adobe, software, Creative, company, best, towards, known, rich","description":"Adobe Systems Incorporated is an American multinational computer software company. The company is headquartered in San Jose, California, United States. Adobe has historically focused upon the creation of multimedia and creativity software products, with a more","og:title":"Adobe","og:description":"Adobe Systems Incorporated is an American multinational computer software company. The company is headquartered in San Jose, California, United States. Adobe has historically focused upon the creation of multimedia and creativity software products, with a more","og:image":"https://old.roi4cio.com/uploads/roi/company/adobe_logo.png"},"eventUrl":""},{"id":163,"title":"Microsoft","logoURL":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png","alias":"microsoft","address":"Microsoft","roles":[],"description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface tablet lineup. As of 2011, it was the world's largest software maker by revenue, and one of the world's most valuable companies.","companyTypes":[],"products":{},"vendoredProductsCount":39,"suppliedProductsCount":39,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":66,"vendorPartnersCount":0,"supplierPartnersCount":272,"b4r":0,"categories":{},"companyUrl":"www.microsoft.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Microsoft","keywords":"Microsoft, software, world, products, hardware, Xbox, video, game","description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:title":"Microsoft","og:description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:image":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png"},"eventUrl":""}],"products":[{"id":1568,"logo":false,"scheme":false,"title":"Adobe Experience Cloud","vendorVerified":0,"rating":"2.40","implementationsCount":1,"suppliersCount":0,"alias":"adobe-experience-cloud","companyTypes":[],"description":"Massive amounts of data, the explosion of different devices and screens, and skyrocketing customer expectations are forcing businesses to completely rethink their approach. This next wave of transformation will be all about experience. To keep customers engaged, leading brands are now reimagining their experiences to drive brand loyalty and growth. Adobe Experience Cloud is your one-stop shop for everything your business needs to deliver these amazing experiences.\r\nAdobe Experience Cloud gives you access to an integrated set of solutions to build campaigns, manage your advertising, and gain deep intelligence about your business. And it’s all unified through powerful core services that give you access to your customer profiles, centralized assets, powerful tagging, and an ecosystem of partners and developers to extend the value of all the solutions. It’s everything you need to orchestrate a great customer experience.\r\nTailored experiences for every industry:\r\n<ul><li> Financial Services</li><li> Government</li><li> High tech</li><li> Manufacturing</li><li> Media & Entertainment</li><li> Retail</li><li> Telecommunications</li><li> Travel & hospitality</li><li> Healthcare</li></ul>\r\n\r\n","shortDescription":"Adobe Experience Cloud gives you access to an integrated set of solutions to build campaigns, manage your advertising, and gain deep intelligence about your business. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Digital Marketing with Adobe Marketing Cloud","keywords":" Financial Services, Government, High tech, Manufacturing, Media, Entertainment, Retail, Telecommunications, Travel & hospitality, Healthcare, solutions, campaigns, advertising, intelligence, business, data, customer expectations, experience, customers, engaged, leading, brands, brand loyalty, business\r\n\r\n","description":"Adobe Experience Cloud gives you access to an integrated set of solutions to build campaigns, manage your advertising, and gain deep intelligence about your business. ","og:title":"Digital Marketing with Adobe Marketing Cloud","og:description":"Adobe Experience Cloud gives you access to an integrated set of solutions to build campaigns, manage your advertising, and gain deep intelligence about your business. "},"eventUrl":"","translationId":1568,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":52,"title":"SaaS - software as a service","alias":"saas-software-as-a-service","description":"<span style=\"font-weight: bold;\">Software as a service (SaaS)</span> is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is sometimes referred to as "on-demand software", and was formerly referred to as "software plus services" by Microsoft.\r\n SaaS services is typically accessed by users using a thin client, e.g. via a web browser. SaaS software solutions has become a common delivery model for many business applications, including office software, messaging software, payroll processing software, DBMS software, management software, CAD software, development software, gamification, virtualization, accounting, collaboration, customer relationship management (CRM), Management Information Systems (MIS), enterprise resource planning (ERP), invoicing, human resource management (HRM), talent acquisition, learning management systems, content management (CM), Geographic Information Systems (GIS), and service desk management. SaaS has been incorporated into the strategy of nearly all leading enterprise software companies.\r\nSaaS applications are also known as <span style=\"font-weight: bold;\">Web-based software</span>, <span style=\"font-weight: bold;\">on-demand software</span> and<span style=\"font-weight: bold;\"> hosted software</span>.\r\nThe term "Software as a Service" (SaaS) is considered to be part of the nomenclature of cloud computing, along with Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Desktop as a Service (DaaS),managed software as a service (MSaaS), mobile backend as a service (MBaaS), and information technology management as a service (ITMaaS).\r\nBecause SaaS is based on cloud computing it saves organizations from installing and running applications on their own systems. That eliminates or at least reduces the associated costs of hardware purchases and maintenance and of software and support. The initial setup cost for a SaaS application is also generally lower than it for equivalent enterprise software purchased via a site license.\r\nSometimes, the use of SaaS cloud software can also reduce the long-term costs of software licensing, though that depends on the pricing model for the individual SaaS offering and the enterprise’s usage patterns. In fact, it’s possible for SaaS to cost more than traditional software licenses. This is an area IT organizations should explore carefully.<br />SaaS also provides enterprises the flexibility inherent with cloud services: they can subscribe to a SaaS offering as needed rather than having to buy software licenses and install the software on a variety of computers. The savings can be substantial in the case of applications that require new hardware purchases to support the software.<br /><br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Who uses SaaS?</span></h1>\r\nIndustry analyst Forrester Research notes that SaaS adoption has so far been concentrated mostly in human resource management (HRM), customer relationship management (CRM), collaboration software (e.g., email), and procurement solutions, but is poised to widen. Today it’s possible to have a data warehouse in the cloud that you can access with business intelligence software running as a service and connect to your cloud-based ERP like NetSuite or Microsoft Dynamics.The dollar savings can run into the millions. And SaaS installations are often installed and working in a fraction of the time of on-premises deployments—some can be ready in hours. \r\nSales and marketing people are likely familiar with Salesforce.com, the leading SaaS CRM software, with millions of users across more than 100,000 customers. Sales is going SaaS too, with apps available to support sales in order management, compensation, quote production and configure, price, quoting, electronic signatures, contract management and more.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why SaaS? Benefits of software as a service</span></h1>\r\n<ul><li><span style=\"font-weight: bold;\">Lower cost of entry</span>. With SaaS solution, you pay for what you need, without having to buy hardware to host your new applications. Instead of provisioning internal resources to install the software, the vendor provides APIs and performs much of the work to get their software working for you. The time to a working solution can drop from months in the traditional model to weeks, days or hours with the SaaS model. In some businesses, IT wants nothing to do with installing and running a sales app. In the case of funding software and its implementation, this can be a make-or-break issue for the sales and marketing budget, so the lower cost really makes the difference.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reduced time to benefit/rapid prototyping</span>. In the SaaS model, the software application is already installed and configured. Users can provision the server for the cloud and quickly have the application ready for use. This cuts the time to benefit and allows for rapid demonstrations and prototyping. With many SaaS companies offering free trials, this means a painless proof of concept and discovery phase to prove the benefit to the organization. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Pay as you go</span>. SaaS business software gives you the benefit of predictable costs both for the subscription and to some extent, the administration. Even as you scale, you can have a clear idea of what your costs will be. This allows for much more accurate budgeting, especially as compared to the costs of internal IT to manage upgrades and address issues for an owned instance.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">The SaaS vendor is responsible for upgrades, uptime and security</span>. Under the SaaS model, since the software is hosted by the vendor, they take on the responsibility for maintaining the software and upgrading it, ensuring that it is reliable and meeting agreed-upon service level agreements, and keeping the application and its data secure. While some IT people worry about Software as a Service security outside of the enterprise walls, the likely truth is that the vendor has a much higher level of security than the enterprise itself would provide. Many will have redundant instances in very secure data centers in multiple geographies. Also, the data is being automatically backed up by the vendor, providing additional security and peace of mind. Because of the data center hosting, you’re getting the added benefit of at least some disaster recovery. Lastly, the vendor manages these issues as part of their core competencies—let them.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Integration and scalability.</span> Most SaaS apps are designed to support some amount of customization for the way you do business. SaaS vendors create APIs to allow connections not only to internal applications like ERPs or CRMs but also to other SaaS providers. One of the terrific aspects of integration is that orders written in the field can be automatically sent to the ERP. Now a salesperson in the field can check inventory through the catalog, write the order in front of the customer for approval, send it and receive confirmation, all in minutes. And as you scale with a SaaS vendor, there’s no need to invest in server capacity and software licenses. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Work anywhere</span>. Since the software is hosted in the cloud and accessible over the internet, users can access it via mobile devices wherever they are connected. This includes checking customer order histories prior to a sales call, as well as having access to real time data and real time order taking with the customer.</li></ul>\r\n<p class=\"align-left\"> </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/SaaS__1_.png"},{"id":146,"title":"ECM - Enterprise Content Management","alias":"ecm-enterprise-content-management","description":"<span style=\"font-weight: bold; \">Enterprise content management (ECM)</span> extends the concept of content management by adding a time line for each content item and possibly enforcing processes for the creation, approval and distribution of them. Systems that implement ECM generally provide a secure repository for managed items, be they analog or digital, that indexes them. They also include one or more methods for importing content to bring new items under management and several presentation methods to make items available for use. The key feature of ECM that distinguishes it from "simple" content management is that an ECM is at least cognizant of the processes and procedures of the enterprise it is created for, and as such is particular to it. \r\nECM as an umbrella term covers enterprise document management system, Web content management, search, collaboration, records management, digital asset management (DAM), workflow management, capture and scanning. ECM is primarily aimed at managing the life-cycle of information from initial publication or creation all the way through archival and eventual disposal. ECM enterprise content management software is delivered in four ways:\r\n- on-premises software (installed on an organization's own network)\r\n- software as a service (SaaS) (Web access to information that is stored on a software manufacturer's system)\r\n- a hybrid composed of both on-premises and SaaS components\r\n- Infrastructure as a Service (IaaS) (which refers to online services that abstract the user from the details of infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc.)\r\n<span style=\"font-weight: bold;\">ECM provides</span> a centralized platform where content can be held and disseminated in a manner that meets regulatory compliance requirements and risk management guidelines. An ECM achieves the latter two benefits by eliminating ad hoc processes that can expose an enterprise to regulatory compliance risks and other potential problems. Full-function enterprise content management solutions include features such as content taxonomies, auditing capabilities, check-in/check-out and other workflow controls and security mechanisms.\r\nAn <span style=\"font-weight: bold;\">effective ECM </span>can streamline access and business processes, eliminate bottlenecks by reducing storage, as well as paper and mailing needs, optimize security, maintain integrity and minimize overhead. All of these can lead to increased productivity. The first step is to document all the types of content that the organization deals with, the business processes its part of and who handles the content. \r\nECM software can be used to identify duplicate and near-duplicate content, allowing the organization to keep a few copies of a particular piece of content instead of hundreds. The best ECM software extends the reach of traditional ECM capabilities into previously isolated applications and information silos, such as ERP, CRM, SCM and HCM, to take the shape of a content services platform. Information can now flow across the enterprise to the people and processes—when, where and in whatever context it is needed.\r\nTo understand more specific ways it could help your company, consider these <span style=\"font-weight: bold; \">three types of ECM</span> software solutions.\r\n<span style=\"font-weight: bold; \">Web Content Management.</span> WCM puts control over the look and feel of a website in the hands of specific, key people. It’s used by organizations with relatively complex websites and strict brand guidelines, giving those key personnel the means to easily update, modify and publish content for the sites while adhering to the guidelines.\r\n<span style=\"font-weight: bold; \">Collaborative Content Management.</span> CCM enables multiple people to access and modify a single document, such as a legal document. It’s ideal for organizations that must manage projects involving multiple stakeholders. CCM makes it easy to work together while keeping track of, and updating, the most-current version of the document.\r\n<span style=\"font-weight: bold; \">Transactional Content Management.</span> This type of ECM document management is designed for organizations that repeatedly use varied types of content, including records, paper documents, and digital files. TCM solutions capture content from various channels, classify it, store it, create an automated workflow to ensure the right user receives the content at the right time, and even deletes documents when they’re no longer needed, all while working seamlessly with other apps and databases, ensuring all of that content is available throughout the company.<br /><br /><br />\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: bold; \">What is Enterprise Content Management (ECM)?</span></h1>\r\nEnterprise Content Management is the organization of structured and unstructured documents using technology and software that allows your organization to “work smarter, not harder.” As technology advanced and everything became digital, organizations needed a new way to store and access files, leading to the creation of ECM. \r\nECM document management system consists of four main points:\r\n<ul><li><span style=\"font-weight: bold; \">Capture:</span> Capturing information from hardcopy documents or online forms and transferring it into the system</li><li><span style=\"font-weight: bold; \">Manage:</span> Managing the captured data in a structured format that allows quick and easy retrieval</li><li><span style=\"font-weight: bold; \">Storing:</span> Securely storing files in a central repository that can be accessed from multiple locations</li><li><span style=\"font-weight: bold; \">Delivery:</span> Implementation of business process workflows to automatically move documents from one step to the next</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Five ways ECM software can benefit your organization</span></h1>\r\n<span style=\"font-weight: bold; \">Basic file sharing and library services.</span> At its core, enterprise document management software begins with basic file sharing and library services managed within a networked repository. Individuals and groups with predefined access rights and permissions can access the repository and then create, read, update and delete files stored within it.\r\nMany ECM applications support Content Management Interoperability Services, an industry standard that allows different vendors' products to interoperate; this is an essential capability within large enterprises that maintain content management tools from multiple vendors.\r\n<span style=\"font-weight: bold; \">Content governance, compliance and records management.</span> For many organizations, managing business documents or other content types is a critical use case for ECM. Companies subject to compliance or other industry regulations need document content management system software to capture, manage, archive and ultimately dispose of files after a predefined period.\r\nECM can ensure that only individuals with predefined permissions - determined by access controls - can update or view documents stored within a repository. An organization can thus manage document modification.\r\nIn addition, enterprise content management tools can log all actions, providing an organization with the capabilities to maintain an auditable record of all the changes to documents within the repository.\r\n<span style=\"font-weight: bold; \">Business process management.</span> Companies also use ECM to establish workflows that span departments and geographies to support extended enterprise and inter-enterprise business processes.\r\nMost ECM software provides tools to help both technical and non-technical business users define business processes. Most applications provide audit controls to track each step of the process and analytic capabilities to help identify inefficiencies and streamline business procedures.\r\n<span style=\"font-weight: bold; \">Content repositories linked to other enterprise applications.</span> Some companies use electronic content management software as a repository for documents created by other enterprise applications, including CRM, ERP, HR and financial systems. These enterprise systems can seamlessly access, view or modify content managed by the ECM.\r\n<span style=\"font-weight: bold; \">Enabling mobile and remote workforces.</span> Content management tools often include functionality to allow remote workers to access content from mobile devices. This is an increasingly important feature for many companies.\r\nMobile capabilities also enable new kinds of data capture and presentation functionalities. By combining content management capabilities with other data, for example, a political canvasser can use a tablet to enter new information about a political donor without having to start from scratch, as some of that information is already stored in a content management system. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/ECM_-_Enterprise_Content_Management.png"},{"id":69,"title":"Business Analytics","alias":"business-analytics","description":"Business Analytics is “the study of data through statistical and operations analysis, the formation of predictive models, application of optimization techniques, and the communication of these results to customers, business partners, and college executives.” Business Analytics requires quantitative methods and evidence-based data for business modeling and decision making; as such, Business Analytics requires the use of Big Data.\r\nSAS describes Big Data as “a term that describes the large volume of data – both structured and unstructured – that inundates a business on a day-to-day basis.” What’s important to keep in mind about Big Data is that the amount of data is not as important to an organization as the analytics that accompany it. When companies analyze Big Data, they are using Business Analytics to get the insights required for making better business decisions and strategic moves.\r\nCompanies use Business Analytics (BA) to make data-driven decisions. The insight gained by BA enables these companies to automate and optimize their business processes. In fact, data-driven companies that utilize Business Analytics achieve a competitive advantage because they are able to use the insights to:\r\n<ul><li>Conduct data mining (explore data to find new patterns and relationships)</li><li>Complete statistical analysis and quantitative analysis to explain why certain results occur</li><li>Test previous decisions using A/B testing and multivariate testing</li><li>Make use of predictive modeling and predictive analytics to forecast future results</li></ul>\r\nBusiness Analytics also provides support for companies in the process of making proactive tactical decisions, and BA makes it possible for those companies to automate decision making in order to support real-time responses.","materialsDescription":"<span style=\"font-weight: bold; \">What does Business Analytics (BA) mean?</span>\r\nBusiness analytics (BA) refers to all the methods and techniques that are used by an organization to measure performance. Business analytics are made up of statistical methods that can be applied to a specific project, process or product. Business analytics can also be used to evaluate an entire company. Business analytics are performed in order to identify weaknesses in existing processes and highlight meaningful data that will help an organization prepare for future growth and challenges.\r\nThe need for good business analytics has spurred the creation of business analytics software and enterprise platforms that mine an organization’s data in order to automate some of these measures and pick out meaningful insights.\r\nAlthough the term has become a bit of a buzzword, business analytics are a vital part of any business. Business analytics make up a large portion of decision support systems, continuous improvement programs and many of the other techniques used to keep a business competitive. Consequently, accurate business analytics like efficiency measures and capacity utilization rates are the first step to properly implementing these techniques.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Business_Analytics.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1575,"logo":false,"scheme":false,"title":"Microsoft Dynamics 365","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"microsoft-dynamics-365","companyTypes":[],"description":"\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Sales</span></p>\r\n<p>Empower sellers with insights to personalize relationships, predict customer needs, and increase sales.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Retail</span></p>\r\n<p>Create personalized shopping experiences that unify digital, in-store, and back office operations.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Customer Service</span></p>\r\n<p>Exceed customer expectations across self and assisted support with empowered agents that deliver personalized experiences.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Field Service</span></p>\r\n<p>Serve customers better through proactive maintenance, predictive scheduling, and first-time fix.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Project Service Automation</span></p>\r\n<p>Deliver customer projects on-time, within budget, and become a trusted advisor.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Finance and Operations</span></p>\r\n<p>Modernize your business operations across finance, manufacturing, and supply chain to drive new growth.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Talent</span></p>\r\n<p>Attract the right people and seamlessly onboard, engage, and grow your talent.</p>\r\n<p><span style=\"font-weight: bold;\">Adobe Marketing Cloud</span></p>\r\n<p>Deliver personalized experiences throughout your marketing and sales engagements at scale with Dynamics 365 and Adobe.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Marketing</span></p>\r\n<p>Increase demand by automating tasks from multi-channel campaigns to events with an application built on the same platform as Dynamics 365 for Sales.</p>\r\n","shortDescription":"Microsoft Dynamics 365 is unified CRM and ERP capabilities — modern, intelligent cloud applications that help move your business forward.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Dynamics 365","keywords":"","description":"\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Sales</span></p>\r\n<p>Empower sellers with insights to personalize relationships, predict customer needs, and increase sales.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Retail</span></p>\r\n<p>","og:title":"Microsoft Dynamics 365","og:description":"\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Sales</span></p>\r\n<p>Empower sellers with insights to personalize relationships, predict customer needs, and increase sales.</p>\r\n<p><span style=\"font-weight: bold;\">Dynamics 365 for Retail</span></p>\r\n<p>"},"eventUrl":"","translationId":1576,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"<span style=\"font-weight: bold;\">Customer service</span> is the provision of service to customers before, during and after a purchase. The perception of success of such interactions is dependent on employees "who can adjust themselves to the personality of the guest". Customer service concerns the priority an organization assigns to customer service relative to components such as product innovation and pricing. In this sense, an organization that values good customer service may spend more money in training employees than the average organization or may proactively interview customers for feedback.\r\nA <span style=\"font-weight: bold;\">customer support</span> is a range of customer services to assist customers in making cost effective and correct use of a product. It includes assistance in planning, installation, training, trouble shooting, maintenance, upgrading, and disposal of a product. These services even may be done at customer's side where he/she uses the product or service. In this case it is called "at home customer services" or "at home customer support."\r\nRegarding technology, products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods, it is termed technical support. \r\nCustomer service may be provided by a person (e.g., sales and service representative), or by automated means, such as kiosks, Internet sites, and apps.\r\n<span style=\"font-weight: bold;\">CRM </span>(Customer Relationship Management) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.\r\nOne important aspect of the CRM approach is the systems of CRM that compile data from a range of different communication channels, including a company's website, telephone, email, live chat, marketing materials and more recently, social media. Through the CRM approach and the systems used to facilitate it, businesses learn more about their target audiences and how to best cater to their needs.\r\nCRM helps users focus on their organization’s relationships with individual people including customers, service users, colleagues, or suppliers.\r\nWhen people talk about customer relationship management system, they might mean any of three things: \r\n<ul><li><span style=\"font-weight: bold;\">CRM as Technology</span>: This is a technology product, often in the cloud, that teams use to record, report and analyse interactions between the company and users. This is also called a CRM system or solution.</li><li><span style=\"font-weight: bold;\">CRM as a Strategy</span>: This is a business’ philosophy about how relationships with customers and potential customers should be managed. </li><li><span style=\"font-weight: bold;\">CRM as a Process</span>: Think of this as a system a business adopts to nurture and manage those relationships.</li></ul>\r\n<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why is CRM important?</span></h1>\r\nCRM management system enables a business to deepen its relationships with customers, service users, colleagues, partners and suppliers.\r\nForging good relationships and keeping track of prospects and customers is crucial for customer acquisition and retention, which is at the heart of a CRM’s function. You can see everything in one place — a simple, customizable dashboard that can tell you a customer’s previous history with you, the status of their orders, any outstanding customer service issues, and more.\r\nGartner predicts that by 2021, CRM technology will be the single largest revenue area of spending in enterprise software. If your business is going to last, you know that you need a strategy for the future. For forward-thinking businesses, CRM is the framework for that strategy.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the benefits of CRM?</span></h1>\r\nBy collecting and organising data about customer interactions, making it accessible and actionable for all, and facilitating analysis of that data, CRM offers many benefits and advantages.<br />The benefits and advantages of CRM include:\r\n<ul><li>Enhanced contact management</li><li>Cross-team collaboration</li><li>Heightened productivity</li><li>Empowered sales management</li><li>Accurate sales forecasting</li><li>Reliable reporting</li><li>Improved sales metrics</li><li>Increased customer satisfaction and retention</li><li>Boosted marketing ROI</li><li>Enriched products and services</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the key features of most popular CRM software programs?</span></h1>\r\nWhile many CRM solutions differ in their specific value propositions — depending on your business size, priority function, or industry type — they usually share some core features. These, in fact, are the foundation of any top CRM software, without which you might end up using an inferior app or an over-rated address book. So, let’s discuss the key features you need to look for when figuring out the best CRM software for your business.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Contact management</span>. The best CRM solutions aren’t just an address book that only organizes contact details. It manages customer data in a centralized place and gives you a 360-degree view of your customers. You should be able to organize customers’ personal information, demographics, interactions, and transactions in ways that are meaningful to your goals or processes. Moreover, a good contact management feature lets you personalize your outreach campaign. By collecting personal, social, and purchase data, it will help you to segment target audience groups in different ways.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reporting and dashboards</span>. These features of customer relationship management allow you to use analytics to interpret customer data. Reporting is very useful if you want to consolidate disparate data and churn out insights in different visualizations. This lets you make better decisions or proactively deal with market trends and customer behavioral patterns. The more visual widgets a CRM software has, the better you can present reports. Furthermore, a best customer relationship management software will generate real-time data, making reporting more accurate and timely. Reporting also keeps you tab on sales opportunities like upsell, resell, and cross-sell, especially when integrated with e-commerce platforms.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Lead management</span>. These features let you manage leads all the way to win-loss stage. They pave a clear path to conversion, so you can quickly assess how the business is performing. One of the main three legs that comprises the best client relationship management software (the other two being contact management and reporting), lead management unburdens the sales team from follow-ups, tracking, and repetitive tasks.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Deals and tasks</span>. Deals and tasks are closely associated with leads. Deals are leads at the negotiation stage, so it’s critical to keep a close eye on their associated tasks for a higher chance of conversion.<br />CRM software tools should also let you track both deals and tasks in their respective windows or across the sales stages. Whether you’re viewing a contact or analyzing the sales pipeline, you should be able to immediately check the deal’s tasks and details. Deals and tasks should also have user permissions to protect leaks of sensitive data. Similarly, alerts are critical to tasks so deadlines are met. Notifications are usually sent via email or prominently displayed on the user’s dashboard.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Campaign management</span>. Solid CRM software will integrate this feature to enable marketing processes from outreach concept to A/B testing to deployment and to post analysis. This will allow you to sort campaigns to target segments in your contacts and define deployment strategies. You will also be able to define metrics for various channels, then plow back the insights generated by post-campaign analytics into planning more campaigns.<br />Recurring outreach efforts can also be automated. For instance, you can set to instantly appropriate content to contacts based on their interest or send tiered autoresponders based on campaign feedback.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Email management</span>. By integrating with popular email clients like Gmail and Outlook, CRM solutions can capture email messages and sort important details that can be saved in contacts or synced with leads. They can also track activities like opened emails, forwarded emails, clicked links, and downloaded files. Emails can also be qualified for prospecting.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Social media management. </span>Popular CRM systems feature an integrated social media management where you can view different social media pages from the CRM’s interface. This is a convenient way to post, reply on, and manage all your pages. Likewise, this feature gives you a better perspective on how customers are interacting with your brand. A glean of their likes and dislikes, interests, shares, and public conversations helps you to assess customer biases and preferences. Customers are also increasingly using social media to contact companies; hence, a good CRM should alert you for brand mentions.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Mobile access</span>. With more users accessing apps via mobile devices, many vendors have been prioritizing mobile-first platforms. Emergence Capital Partners study found over 300 mobile-first apps so far and CRM is definitely one their targets. Many CRM solutions have both Android and iOS apps. Mobile access works in two ways to be highly appreciated: accessing data and inputting data while on location. Field sales with the latest sales information on hand may be able to interest prospects better. Conversely, sales reps can quickly update deals across the pipeline even as they come off a client meeting.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CRM_-_Customer_Relationship_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"planned","statusLabel":"Planned","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":389,"title":"Customer attrition"},{"id":390,"title":"Low quality of customer support"}]}},"categories":[{"id":52,"title":"SaaS - software as a service","alias":"saas-software-as-a-service","description":"<span style=\"font-weight: bold;\">Software as a service (SaaS)</span> is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is sometimes referred to as "on-demand software", and was formerly referred to as "software plus services" by Microsoft.\r\n SaaS services is typically accessed by users using a thin client, e.g. via a web browser. SaaS software solutions has become a common delivery model for many business applications, including office software, messaging software, payroll processing software, DBMS software, management software, CAD software, development software, gamification, virtualization, accounting, collaboration, customer relationship management (CRM), Management Information Systems (MIS), enterprise resource planning (ERP), invoicing, human resource management (HRM), talent acquisition, learning management systems, content management (CM), Geographic Information Systems (GIS), and service desk management. SaaS has been incorporated into the strategy of nearly all leading enterprise software companies.\r\nSaaS applications are also known as <span style=\"font-weight: bold;\">Web-based software</span>, <span style=\"font-weight: bold;\">on-demand software</span> and<span style=\"font-weight: bold;\"> hosted software</span>.\r\nThe term "Software as a Service" (SaaS) is considered to be part of the nomenclature of cloud computing, along with Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Desktop as a Service (DaaS),managed software as a service (MSaaS), mobile backend as a service (MBaaS), and information technology management as a service (ITMaaS).\r\nBecause SaaS is based on cloud computing it saves organizations from installing and running applications on their own systems. That eliminates or at least reduces the associated costs of hardware purchases and maintenance and of software and support. The initial setup cost for a SaaS application is also generally lower than it for equivalent enterprise software purchased via a site license.\r\nSometimes, the use of SaaS cloud software can also reduce the long-term costs of software licensing, though that depends on the pricing model for the individual SaaS offering and the enterprise’s usage patterns. In fact, it’s possible for SaaS to cost more than traditional software licenses. This is an area IT organizations should explore carefully.<br />SaaS also provides enterprises the flexibility inherent with cloud services: they can subscribe to a SaaS offering as needed rather than having to buy software licenses and install the software on a variety of computers. The savings can be substantial in the case of applications that require new hardware purchases to support the software.<br /><br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Who uses SaaS?</span></h1>\r\nIndustry analyst Forrester Research notes that SaaS adoption has so far been concentrated mostly in human resource management (HRM), customer relationship management (CRM), collaboration software (e.g., email), and procurement solutions, but is poised to widen. Today it’s possible to have a data warehouse in the cloud that you can access with business intelligence software running as a service and connect to your cloud-based ERP like NetSuite or Microsoft Dynamics.The dollar savings can run into the millions. And SaaS installations are often installed and working in a fraction of the time of on-premises deployments—some can be ready in hours. \r\nSales and marketing people are likely familiar with Salesforce.com, the leading SaaS CRM software, with millions of users across more than 100,000 customers. Sales is going SaaS too, with apps available to support sales in order management, compensation, quote production and configure, price, quoting, electronic signatures, contract management and more.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why SaaS? Benefits of software as a service</span></h1>\r\n<ul><li><span style=\"font-weight: bold;\">Lower cost of entry</span>. With SaaS solution, you pay for what you need, without having to buy hardware to host your new applications. Instead of provisioning internal resources to install the software, the vendor provides APIs and performs much of the work to get their software working for you. The time to a working solution can drop from months in the traditional model to weeks, days or hours with the SaaS model. In some businesses, IT wants nothing to do with installing and running a sales app. In the case of funding software and its implementation, this can be a make-or-break issue for the sales and marketing budget, so the lower cost really makes the difference.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reduced time to benefit/rapid prototyping</span>. In the SaaS model, the software application is already installed and configured. Users can provision the server for the cloud and quickly have the application ready for use. This cuts the time to benefit and allows for rapid demonstrations and prototyping. With many SaaS companies offering free trials, this means a painless proof of concept and discovery phase to prove the benefit to the organization. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Pay as you go</span>. SaaS business software gives you the benefit of predictable costs both for the subscription and to some extent, the administration. Even as you scale, you can have a clear idea of what your costs will be. This allows for much more accurate budgeting, especially as compared to the costs of internal IT to manage upgrades and address issues for an owned instance.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">The SaaS vendor is responsible for upgrades, uptime and security</span>. Under the SaaS model, since the software is hosted by the vendor, they take on the responsibility for maintaining the software and upgrading it, ensuring that it is reliable and meeting agreed-upon service level agreements, and keeping the application and its data secure. While some IT people worry about Software as a Service security outside of the enterprise walls, the likely truth is that the vendor has a much higher level of security than the enterprise itself would provide. Many will have redundant instances in very secure data centers in multiple geographies. Also, the data is being automatically backed up by the vendor, providing additional security and peace of mind. Because of the data center hosting, you’re getting the added benefit of at least some disaster recovery. Lastly, the vendor manages these issues as part of their core competencies—let them.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Integration and scalability.</span> Most SaaS apps are designed to support some amount of customization for the way you do business. SaaS vendors create APIs to allow connections not only to internal applications like ERPs or CRMs but also to other SaaS providers. One of the terrific aspects of integration is that orders written in the field can be automatically sent to the ERP. Now a salesperson in the field can check inventory through the catalog, write the order in front of the customer for approval, send it and receive confirmation, all in minutes. And as you scale with a SaaS vendor, there’s no need to invest in server capacity and software licenses. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Work anywhere</span>. Since the software is hosted in the cloud and accessible over the internet, users can access it via mobile devices wherever they are connected. This includes checking customer order histories prior to a sales call, as well as having access to real time data and real time order taking with the customer.</li></ul>\r\n<p class=\"align-left\"> </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/SaaS__1_.png"},{"id":146,"title":"ECM - Enterprise Content Management","alias":"ecm-enterprise-content-management","description":"<span style=\"font-weight: bold; \">Enterprise content management (ECM)</span> extends the concept of content management by adding a time line for each content item and possibly enforcing processes for the creation, approval and distribution of them. Systems that implement ECM generally provide a secure repository for managed items, be they analog or digital, that indexes them. They also include one or more methods for importing content to bring new items under management and several presentation methods to make items available for use. The key feature of ECM that distinguishes it from "simple" content management is that an ECM is at least cognizant of the processes and procedures of the enterprise it is created for, and as such is particular to it. \r\nECM as an umbrella term covers enterprise document management system, Web content management, search, collaboration, records management, digital asset management (DAM), workflow management, capture and scanning. ECM is primarily aimed at managing the life-cycle of information from initial publication or creation all the way through archival and eventual disposal. ECM enterprise content management software is delivered in four ways:\r\n- on-premises software (installed on an organization's own network)\r\n- software as a service (SaaS) (Web access to information that is stored on a software manufacturer's system)\r\n- a hybrid composed of both on-premises and SaaS components\r\n- Infrastructure as a Service (IaaS) (which refers to online services that abstract the user from the details of infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc.)\r\n<span style=\"font-weight: bold;\">ECM provides</span> a centralized platform where content can be held and disseminated in a manner that meets regulatory compliance requirements and risk management guidelines. An ECM achieves the latter two benefits by eliminating ad hoc processes that can expose an enterprise to regulatory compliance risks and other potential problems. Full-function enterprise content management solutions include features such as content taxonomies, auditing capabilities, check-in/check-out and other workflow controls and security mechanisms.\r\nAn <span style=\"font-weight: bold;\">effective ECM </span>can streamline access and business processes, eliminate bottlenecks by reducing storage, as well as paper and mailing needs, optimize security, maintain integrity and minimize overhead. All of these can lead to increased productivity. The first step is to document all the types of content that the organization deals with, the business processes its part of and who handles the content. \r\nECM software can be used to identify duplicate and near-duplicate content, allowing the organization to keep a few copies of a particular piece of content instead of hundreds. The best ECM software extends the reach of traditional ECM capabilities into previously isolated applications and information silos, such as ERP, CRM, SCM and HCM, to take the shape of a content services platform. Information can now flow across the enterprise to the people and processes—when, where and in whatever context it is needed.\r\nTo understand more specific ways it could help your company, consider these <span style=\"font-weight: bold; \">three types of ECM</span> software solutions.\r\n<span style=\"font-weight: bold; \">Web Content Management.</span> WCM puts control over the look and feel of a website in the hands of specific, key people. It’s used by organizations with relatively complex websites and strict brand guidelines, giving those key personnel the means to easily update, modify and publish content for the sites while adhering to the guidelines.\r\n<span style=\"font-weight: bold; \">Collaborative Content Management.</span> CCM enables multiple people to access and modify a single document, such as a legal document. It’s ideal for organizations that must manage projects involving multiple stakeholders. CCM makes it easy to work together while keeping track of, and updating, the most-current version of the document.\r\n<span style=\"font-weight: bold; \">Transactional Content Management.</span> This type of ECM document management is designed for organizations that repeatedly use varied types of content, including records, paper documents, and digital files. TCM solutions capture content from various channels, classify it, store it, create an automated workflow to ensure the right user receives the content at the right time, and even deletes documents when they’re no longer needed, all while working seamlessly with other apps and databases, ensuring all of that content is available throughout the company.<br /><br /><br />\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: bold; \">What is Enterprise Content Management (ECM)?</span></h1>\r\nEnterprise Content Management is the organization of structured and unstructured documents using technology and software that allows your organization to “work smarter, not harder.” As technology advanced and everything became digital, organizations needed a new way to store and access files, leading to the creation of ECM. \r\nECM document management system consists of four main points:\r\n<ul><li><span style=\"font-weight: bold; \">Capture:</span> Capturing information from hardcopy documents or online forms and transferring it into the system</li><li><span style=\"font-weight: bold; \">Manage:</span> Managing the captured data in a structured format that allows quick and easy retrieval</li><li><span style=\"font-weight: bold; \">Storing:</span> Securely storing files in a central repository that can be accessed from multiple locations</li><li><span style=\"font-weight: bold; \">Delivery:</span> Implementation of business process workflows to automatically move documents from one step to the next</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Five ways ECM software can benefit your organization</span></h1>\r\n<span style=\"font-weight: bold; \">Basic file sharing and library services.</span> At its core, enterprise document management software begins with basic file sharing and library services managed within a networked repository. Individuals and groups with predefined access rights and permissions can access the repository and then create, read, update and delete files stored within it.\r\nMany ECM applications support Content Management Interoperability Services, an industry standard that allows different vendors' products to interoperate; this is an essential capability within large enterprises that maintain content management tools from multiple vendors.\r\n<span style=\"font-weight: bold; \">Content governance, compliance and records management.</span> For many organizations, managing business documents or other content types is a critical use case for ECM. Companies subject to compliance or other industry regulations need document content management system software to capture, manage, archive and ultimately dispose of files after a predefined period.\r\nECM can ensure that only individuals with predefined permissions - determined by access controls - can update or view documents stored within a repository. An organization can thus manage document modification.\r\nIn addition, enterprise content management tools can log all actions, providing an organization with the capabilities to maintain an auditable record of all the changes to documents within the repository.\r\n<span style=\"font-weight: bold; \">Business process management.</span> Companies also use ECM to establish workflows that span departments and geographies to support extended enterprise and inter-enterprise business processes.\r\nMost ECM software provides tools to help both technical and non-technical business users define business processes. Most applications provide audit controls to track each step of the process and analytic capabilities to help identify inefficiencies and streamline business procedures.\r\n<span style=\"font-weight: bold; \">Content repositories linked to other enterprise applications.</span> Some companies use electronic content management software as a repository for documents created by other enterprise applications, including CRM, ERP, HR and financial systems. These enterprise systems can seamlessly access, view or modify content managed by the ECM.\r\n<span style=\"font-weight: bold; \">Enabling mobile and remote workforces.</span> Content management tools often include functionality to allow remote workers to access content from mobile devices. This is an increasingly important feature for many companies.\r\nMobile capabilities also enable new kinds of data capture and presentation functionalities. By combining content management capabilities with other data, for example, a political canvasser can use a tablet to enter new information about a political donor without having to start from scratch, as some of that information is already stored in a content management system. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/ECM_-_Enterprise_Content_Management.png"},{"id":69,"title":"Business Analytics","alias":"business-analytics","description":"Business Analytics is “the study of data through statistical and operations analysis, the formation of predictive models, application of optimization techniques, and the communication of these results to customers, business partners, and college executives.” Business Analytics requires quantitative methods and evidence-based data for business modeling and decision making; as such, Business Analytics requires the use of Big Data.\r\nSAS describes Big Data as “a term that describes the large volume of data – both structured and unstructured – that inundates a business on a day-to-day basis.” What’s important to keep in mind about Big Data is that the amount of data is not as important to an organization as the analytics that accompany it. When companies analyze Big Data, they are using Business Analytics to get the insights required for making better business decisions and strategic moves.\r\nCompanies use Business Analytics (BA) to make data-driven decisions. The insight gained by BA enables these companies to automate and optimize their business processes. In fact, data-driven companies that utilize Business Analytics achieve a competitive advantage because they are able to use the insights to:\r\n<ul><li>Conduct data mining (explore data to find new patterns and relationships)</li><li>Complete statistical analysis and quantitative analysis to explain why certain results occur</li><li>Test previous decisions using A/B testing and multivariate testing</li><li>Make use of predictive modeling and predictive analytics to forecast future results</li></ul>\r\nBusiness Analytics also provides support for companies in the process of making proactive tactical decisions, and BA makes it possible for those companies to automate decision making in order to support real-time responses.","materialsDescription":"<span style=\"font-weight: bold; \">What does Business Analytics (BA) mean?</span>\r\nBusiness analytics (BA) refers to all the methods and techniques that are used by an organization to measure performance. Business analytics are made up of statistical methods that can be applied to a specific project, process or product. Business analytics can also be used to evaluate an entire company. Business analytics are performed in order to identify weaknesses in existing processes and highlight meaningful data that will help an organization prepare for future growth and challenges.\r\nThe need for good business analytics has spurred the creation of business analytics software and enterprise platforms that mine an organization’s data in order to automate some of these measures and pick out meaningful insights.\r\nAlthough the term has become a bit of a buzzword, business analytics are a vital part of any business. Business analytics make up a large portion of decision support systems, continuous improvement programs and many of the other techniques used to keep a business competitive. Consequently, accurate business analytics like efficiency measures and capacity utilization rates are the first step to properly implementing these techniques.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Business_Analytics.png"},{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"<span style=\"font-weight: bold;\">Customer service</span> is the provision of service to customers before, during and after a purchase. The perception of success of such interactions is dependent on employees "who can adjust themselves to the personality of the guest". Customer service concerns the priority an organization assigns to customer service relative to components such as product innovation and pricing. In this sense, an organization that values good customer service may spend more money in training employees than the average organization or may proactively interview customers for feedback.\r\nA <span style=\"font-weight: bold;\">customer support</span> is a range of customer services to assist customers in making cost effective and correct use of a product. It includes assistance in planning, installation, training, trouble shooting, maintenance, upgrading, and disposal of a product. These services even may be done at customer's side where he/she uses the product or service. In this case it is called "at home customer services" or "at home customer support."\r\nRegarding technology, products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods, it is termed technical support. \r\nCustomer service may be provided by a person (e.g., sales and service representative), or by automated means, such as kiosks, Internet sites, and apps.\r\n<span style=\"font-weight: bold;\">CRM </span>(Customer Relationship Management) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.\r\nOne important aspect of the CRM approach is the systems of CRM that compile data from a range of different communication channels, including a company's website, telephone, email, live chat, marketing materials and more recently, social media. Through the CRM approach and the systems used to facilitate it, businesses learn more about their target audiences and how to best cater to their needs.\r\nCRM helps users focus on their organization’s relationships with individual people including customers, service users, colleagues, or suppliers.\r\nWhen people talk about customer relationship management system, they might mean any of three things: \r\n<ul><li><span style=\"font-weight: bold;\">CRM as Technology</span>: This is a technology product, often in the cloud, that teams use to record, report and analyse interactions between the company and users. This is also called a CRM system or solution.</li><li><span style=\"font-weight: bold;\">CRM as a Strategy</span>: This is a business’ philosophy about how relationships with customers and potential customers should be managed. </li><li><span style=\"font-weight: bold;\">CRM as a Process</span>: Think of this as a system a business adopts to nurture and manage those relationships.</li></ul>\r\n<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why is CRM important?</span></h1>\r\nCRM management system enables a business to deepen its relationships with customers, service users, colleagues, partners and suppliers.\r\nForging good relationships and keeping track of prospects and customers is crucial for customer acquisition and retention, which is at the heart of a CRM’s function. You can see everything in one place — a simple, customizable dashboard that can tell you a customer’s previous history with you, the status of their orders, any outstanding customer service issues, and more.\r\nGartner predicts that by 2021, CRM technology will be the single largest revenue area of spending in enterprise software. If your business is going to last, you know that you need a strategy for the future. For forward-thinking businesses, CRM is the framework for that strategy.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the benefits of CRM?</span></h1>\r\nBy collecting and organising data about customer interactions, making it accessible and actionable for all, and facilitating analysis of that data, CRM offers many benefits and advantages.<br />The benefits and advantages of CRM include:\r\n<ul><li>Enhanced contact management</li><li>Cross-team collaboration</li><li>Heightened productivity</li><li>Empowered sales management</li><li>Accurate sales forecasting</li><li>Reliable reporting</li><li>Improved sales metrics</li><li>Increased customer satisfaction and retention</li><li>Boosted marketing ROI</li><li>Enriched products and services</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the key features of most popular CRM software programs?</span></h1>\r\nWhile many CRM solutions differ in their specific value propositions — depending on your business size, priority function, or industry type — they usually share some core features. These, in fact, are the foundation of any top CRM software, without which you might end up using an inferior app or an over-rated address book. So, let’s discuss the key features you need to look for when figuring out the best CRM software for your business.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Contact management</span>. The best CRM solutions aren’t just an address book that only organizes contact details. It manages customer data in a centralized place and gives you a 360-degree view of your customers. You should be able to organize customers’ personal information, demographics, interactions, and transactions in ways that are meaningful to your goals or processes. Moreover, a good contact management feature lets you personalize your outreach campaign. By collecting personal, social, and purchase data, it will help you to segment target audience groups in different ways.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reporting and dashboards</span>. These features of customer relationship management allow you to use analytics to interpret customer data. Reporting is very useful if you want to consolidate disparate data and churn out insights in different visualizations. This lets you make better decisions or proactively deal with market trends and customer behavioral patterns. The more visual widgets a CRM software has, the better you can present reports. Furthermore, a best customer relationship management software will generate real-time data, making reporting more accurate and timely. Reporting also keeps you tab on sales opportunities like upsell, resell, and cross-sell, especially when integrated with e-commerce platforms.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Lead management</span>. These features let you manage leads all the way to win-loss stage. They pave a clear path to conversion, so you can quickly assess how the business is performing. One of the main three legs that comprises the best client relationship management software (the other two being contact management and reporting), lead management unburdens the sales team from follow-ups, tracking, and repetitive tasks.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Deals and tasks</span>. Deals and tasks are closely associated with leads. Deals are leads at the negotiation stage, so it’s critical to keep a close eye on their associated tasks for a higher chance of conversion.<br />CRM software tools should also let you track both deals and tasks in their respective windows or across the sales stages. Whether you’re viewing a contact or analyzing the sales pipeline, you should be able to immediately check the deal’s tasks and details. Deals and tasks should also have user permissions to protect leaks of sensitive data. Similarly, alerts are critical to tasks so deadlines are met. Notifications are usually sent via email or prominently displayed on the user’s dashboard.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Campaign management</span>. Solid CRM software will integrate this feature to enable marketing processes from outreach concept to A/B testing to deployment and to post analysis. This will allow you to sort campaigns to target segments in your contacts and define deployment strategies. You will also be able to define metrics for various channels, then plow back the insights generated by post-campaign analytics into planning more campaigns.<br />Recurring outreach efforts can also be automated. For instance, you can set to instantly appropriate content to contacts based on their interest or send tiered autoresponders based on campaign feedback.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Email management</span>. By integrating with popular email clients like Gmail and Outlook, CRM solutions can capture email messages and sort important details that can be saved in contacts or synced with leads. They can also track activities like opened emails, forwarded emails, clicked links, and downloaded files. Emails can also be qualified for prospecting.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Social media management. </span>Popular CRM systems feature an integrated social media management where you can view different social media pages from the CRM’s interface. This is a convenient way to post, reply on, and manage all your pages. Likewise, this feature gives you a better perspective on how customers are interacting with your brand. A glean of their likes and dislikes, interests, shares, and public conversations helps you to assess customer biases and preferences. Customers are also increasingly using social media to contact companies; hence, a good CRM should alert you for brand mentions.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Mobile access</span>. With more users accessing apps via mobile devices, many vendors have been prioritizing mobile-first platforms. Emergence Capital Partners study found over 300 mobile-first apps so far and CRM is definitely one their targets. Many CRM solutions have both Android and iOS apps. Mobile access works in two ways to be highly appreciated: accessing data and inputting data while on location. Field sales with the latest sales information on hand may be able to interest prospects better. Conversely, sales reps can quickly update deals across the pipeline even as they come off a client meeting.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CRM_-_Customer_Relationship_Management.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://news.adobe.com/press-release/experience-cloud/microsoft-dynamics-365-and-adobe-experience-cloud-selected-24-hour","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":493,"title":"Autodesk BIM solutions (Revit) to design a hub for innovation in Africa","description":"SHoP Architects uses Autodesk BIM solutions to design a hub for innovation in Africa.\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">LOCATION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">New York, NY</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">SOFTWARE</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Autodesk® Building Design Suite Ultimate</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Autodesk® Revit® Architecture</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Autodesk® Revit® Structure</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Autodesk® 3ds Max® Design</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Autodesk® Ecotect® Analysis</span>\r\n<span style=\"font-weight: bold; \">Project Summary</span>\r\nNew York-based SHoP Architects has made a name for itself—and its designs—since its founding in 1996. Winner of numerous awards, including the 2009 National Design Award for Architecture from the National Design Museum, the firm seeks to design buildings that are exciting, evocative, and highly functional. A longtime user of Building Information Modeling (BIM), SHoP explores its ideas in 3D with the BIM solutions in the Autodesk®\r\n<span style=\"font-weight: bold; \">Building Design Suite Ultimate edition.</span>\r\nThe Botswana Innovation Hub provides an excellent example of both SHoP’s approach to design and the use of BIM to further innovative projects. Located in Gabarone, Botswana, the Botswana Innovation Hub will serve as a 350,000-square-foot office and research center. “The Hub is part of the government of Botswana’s effort to support that nation’s increasingly diverse economy,” says William Sharples, a principal with SHoP. “The building is designed to attract the attention of potential tenants and provide the things innovators need from office and research spaces. Using Autodesk BIM solutions, we were able to explore ideas in the form of 3D models with the client and engineers. BIM helped us use the power of visualization to bridge time and distance.”\r\n<span style=\"font-weight: bold; \">The Challenge</span>\r\nA landlocked country in southern Africa, Botswana gained its independence in 1966. Over the country’s short history, it has gone from being one of the poorest countries in the world to one of the most prosperous countries in sub-Saharan Africa, with diamond and other mineral mining helping to drive the economy. Not wanting to rely solely on those industries for growth, Botswana is encouraging entrepreneurship in other sectors such as technology, green industry, and pharmaceutical research.\r\nTo help support the country’s growth goals, the Botswana Innovation Hub will offer the most upto-date facilities for research and technology work. Because Botswana’s leaders felt the Hub needed an exceptional design to help attract attention and symbolize the country’s commitment to innovation, they decided to hold an international contest to choose the project architect competitively.\r\n<span style=\"font-style: italic; \">“This is a significant investment for the people of Botswana,” says David Tsheboeng, executive director of property development for the Botswana Innovation Hub. “Our leaders wanted to see the best ideas from the world’s architects, but we were not just looking for a striking design. The selection criteria also included sustainability and the use of the latest architectural tools.”</span>\r\n<span style=\"font-weight: bold;\">The Solution</span>\r\nThe contest entry from SHoP stood out for a number of reasons. Designed to blend in with its surroundings, the building model’s organic forms evoked dune and delta landscapes, which are culturally and environmentally important in Botswana. SHoP’s entry also included a number of sustainability options—such as a living roof and shaded courtyards—that harmonized well with the overall goals of the building. SHoP created 3D renderings of its design concepts to help communicate their design ideas using Autodesk® 3ds Max® Design software, which is part of the Autodesk® Building Design Suite Ultimate. Kevin Fennell, project manager for SHoP, explains, “It’s quite typical to include 3D renderings in proposals, of course. But 3ds Max Design made it easier to incorporate details of the surrounding areas into ours. Being able to visualize the design helped the client to see how lightly the design touched the ground and how organically it engages with the landscape.”\r\n<span style=\"font-style: italic;\">“We were honored that Botswana’s leaders chose us to design the Botswana Innovation Hub,” says Sharples. “We relied on BIM and the software in the Building Design Suite to help us model our ideas. Autodesk® Revit® software was our primary design tool. It helped us explore ideas and engage with the design team—and the architectural community in Botswana—in ways that advanced the vision of the project.”</span>\r\n<span style=\"font-weight: bold;\">Sharing the Benefits of BIM</span>\r\nEarly in the project, SHoP hosted a meeting with client representatives in New York, and showed them some Revit models with various options.\r\nBy reviewing the model in 3D, the client was able to see the intent of the design more clearly and provide feedback more quickly. The clients were able to better visualize not just how the building would look, but also how the design team from SHoP envisioned many of the materials coming together.\r\n“Our clients were clear from the beginning that they wanted us to use the latest design tools, but they did not have much firsthand experience with BIM,” says Fennell. “After seeing what BIM can do, our clients suggested we introduce BIM to architects in Botswana. When it came time to select a local architect to help with the detailed design, we got them started with BIM with Revit.\r\nWe also demonstrated our BIM-based workflow at a meeting of Botswana’s architects’ association.” Fast Changes—More Insight Several team members from SHoP went to Africa to meet with the local structural engineer, who was using Autodesk® Revit® Structure software, on the project. During the meeting, the structural engineers suggested some spacing changes in the parking structure that they believed could reduce the amount of structural steel required.\r\n<span style=\"font-style: italic;\">“Looking at the structural model, we saw that their changes would work, and at the end of the day in Africa, we asked our New York office to apply the changes to our Revit model,” reports Steven Garcia, Revit model manager for SHoP.</span>\r\n<span style=\"font-style: italic;\">“You can modify a model-based design very quickly. The changes were ready when we met with the client the next morning. We even knew that the changes could reduce the structural cost by as much as 5 percent.”</span>\r\n<span style=\"font-weight: bold;\">Designing for Sustainability</span>\r\nThe midday sun in Botswana is brutal, and shade provides a welcome respite—even for buildings. SHoP designed the Botswana Innovation Hub with ample overhangs to help shade the building’s many windows. While designing in Autodesk Revit, the team was able to conduct preliminary shading studies as they designed. They then used Autodesk® Ecotect® Analysis software to perform additional analyses, exploring how the shading and building mass affected thermal load. <span style=\"font-style: italic;\">“Shading is one of the most important sustainability features a building can have,” says Fennell. “Being able to design for sustainability before bringing in a sustainability consultant saves tremendous time. We understood more clearly how the overhangs would perform early in the process. Now, we are using Revit to help us understand the best materials to use for the panels.”</span>\r\n<span style=\"font-weight: bold;\">The Result</span>\r\nAs the Botswana Innovation Hub project advances towards the construction phase, Sharples reflects on the role BIM played on the project—and will continue to play. He says, “SHoP has always embraced 3D design, and BIM takes 3D to the next level. On the Hub, BIM is helping everyone on the project understand the design and contribute more easily.”\r\n<span style=\"font-style: italic;\">The clients in Botswana also recognize the contribution made by Autodesk BIM solutions. “We appreciate the visualizations SHoP is providing on the project,” says Tsheboeng. “Being able to share 3D models of the building with leaders in Botswana has helped keep enthusiasm high for the project. However, the value is not just about seeing what the building may look like. We are impressed by how much intelligence about the project SHoP can glean from the models. For instance, they can tell us how design choices might affect the amount of materials required to complete the project. So, we know more, sooner, about how choices may impact the final result.”</span>","alias":"autodesk-bim-solutions-revit-to-design-a-hub-for-innovation-in-africa","roi":0,"seo":{"title":"Autodesk BIM solutions (Revit) to design a hub for innovation in Africa","keywords":"design, with, Botswana, SHoP, project, Autodesk®, from, Design","description":"SHoP Architects uses Autodesk BIM solutions to design a hub for innovation in Africa.\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">LOCATION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Ver","og:title":"Autodesk BIM solutions (Revit) to design a hub for innovation in Africa","og:description":"SHoP Architects uses Autodesk BIM solutions to design a hub for innovation in Africa.\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">LOCATION</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Ver"},"deal_info":"","user":{"id":4258,"title":"SHoP Architects","logoURL":"https://old.roi4cio.com/uploads/roi/company/SHoP_Architects.png","alias":"shop-architects","address":"","roles":[],"description":"SHoP Architects was founded twenty years ago to harness the power of diverse expertise in the design of buildings and environments that improve the quality of public life. Our inclusive, open-minded process allows us to effectively address a broad range of issues in our work: from novel programmatic concepts, to next-generation fabrication and delivery techniques, to beautifully crafted spaces that precisely suit their functions. Years ago we set out to prove that intelligent, evocative architecture can be made with real-world constraints. Today, our interdisciplinary staff of 180 is implementing that idea at critical sites around the world. We are proud that our studio has been recognized with awards such as Fast Company’s “Most Innovative Architecture Firm in the World” in 2014, and the Smithsonian/Cooper Hewitt’s “National Design Award for Architecture” in 2009.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.shoparc.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SHoP Architects","keywords":"that, Architecture, SHoP, Architects, with, critical, idea, sites","description":"SHoP Architects was founded twenty years ago to harness the power of diverse expertise in the design of buildings and environments that improve the quality of public life. Our inclusive, open-minded process allows us to effectively address a broad range of iss","og:title":"SHoP Architects","og:description":"SHoP Architects was founded twenty years ago to harness the power of diverse expertise in the design of buildings and environments that improve the quality of public life. Our inclusive, open-minded process allows us to effectively address a broad range of iss","og:image":"https://old.roi4cio.com/uploads/roi/company/SHoP_Architects.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":180,"title":"Autodesk","logoURL":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg","alias":"autodesk","address":"","roles":[],"description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a gallery of its customers' work in its San Francisco building. The company has offices worldwide, with U.S. locations in Northern California, Oregon, Colorado, Texas and in New England in New Hampshire and Massachusetts, and Canada locations in Ontario, Quebec, and Alberta.","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":33,"b4r":0,"categories":{},"companyUrl":"www.autodesk.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Autodesk","keywords":"Autodesk, California, software, locations, with, worldwide, building, company","description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:title":"Autodesk","og:description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:image":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg"},"eventUrl":""}],"products":[{"id":1414,"logo":false,"scheme":false,"title":"Autodesk Revit","vendorVerified":0,"rating":"3.70","implementationsCount":2,"suppliersCount":0,"alias":"autodesk-revit","companyTypes":[],"description":"<p><span style=\"font-weight: bold;\">What does Revit do?</span> Revit is software for BIM. Its powerful tools let you use the intelligent model-based process to plan, design, construct, and manage buildings and infrastructure. Revit supports a multidiscipline design process for collaborative design.</p>\r\n<ul>\r\n<li>Design. Model building components, analyze and simulate systems and structures, and iterate designs. Generate documentation from Revit models.</li>\r\n<li>Collaborate. Multiple project contributors can access centrally shared models. This results in better coordination, which helps reduce clashes and rework.</li>\r\n<li>Visualize. Communicate design intent more effectively to project owners and team members by using models to create high-impact 3D visuals.</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">One multidiscipline BIM platform</span> Revit has features for all disciplines involved in a building project. When architects, engineers, and construction professionals work on one unified platform, the risk of data translation errors can be reduced and the design process can be more predictable. <span style=\"font-weight: bold;\">Interoperability</span> Revit helps you work with members of an extended project team. It imports, exports, and links your data with commonly used formats, including IFC, DWG™ and DGN. <span style=\"font-weight: bold;\">Tools created expressly for your discipline</span> Whether you’re an architect; a mechanical, electrical, or plumbing (MEP) engineer; a structural engineer; or a construction professional, Revit offers BIM features specifically designed for you. <span style=\"font-weight: bold;\">For architects</span> Use Revit to take an idea from conceptual design to construction documentation within a single software environment. Optimize building performance and create stunning visualizations. <span style=\"font-weight: bold;\">For structural engineers</span> Use tools specific to structural design to create intelligent structure models in coordination with other building components. Evaluate how well they conform to building and safety regulations. <span style=\"font-weight: bold;\">For MEP engineers</span> Design MEP building systems with greater accuracy and in better coordination with architectural and structural components, using the coordinated and consistent information inherent in the intelligent model. <span style=\"font-weight: bold;\">For construction professionals</span> Evaluate constructability and design intent before construction begins. Gain a better understanding of the means, methods, and materials, and how they all come together. <span style=\"font-weight: bold;\">Connect teams with Collaboration for Revit</span> Extend Revit worksharing to project teams in almost any location with this service, which lets multiple users co-author Revit models in the cloud. Increase communication, centralize efforts of distributed teams, and let entire teams take part in the BIM process. <span style=\"font-weight: bold;\">Better team communication</span> Use real-time chat within project models. Know who’s working in the model and what they’re doing. <span style=\"font-weight: bold;\">Extended team integration</span> Subscribe to Collaboration for Revit and receive a subscription to BIM 360 Team, an integrated, cloud-based web service that provides centralized team access to project data. <span style=\"font-weight: bold;\">Access more projects</span> Extend your reach and participate in projects or joint venture partnerships, wherever they’re located. <span style=\"font-weight: bold;\">Better allocate team talents and resources</span> Assign the best team members with the strongest skill sets. Let designers work on multiple projects based in different locations at the same time. <span style=\"font-weight: bold;\">Minimize in-person meetings or co-location of teams</span> Help lower travel expenses and support greater work-life balance for team members. Visualization and rendering. Show how your product will look with visualization and rendering tools.</p>","shortDescription":"Revit® software for BIM (Building Information Modeling) includes features for architectural design, MEP and structural engineering, and construction.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Autodesk Revit","keywords":"","description":"<p><span style=\"font-weight: bold;\">What does Revit do?</span> Revit is software for BIM. Its powerful tools let you use the intelligent model-based process to plan, design, construct, and manage buildings and infrastructure. Revit supports a multidiscipline d","og:title":"Autodesk Revit","og:description":"<p><span style=\"font-weight: bold;\">What does Revit do?</span> Revit is software for BIM. Its powerful tools let you use the intelligent model-based process to plan, design, construct, and manage buildings and infrastructure. Revit supports a multidiscipline d"},"eventUrl":"","translationId":1414,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":780,"title":"CAD for architecture and construction - Computer-Aided Design","alias":"cad-for-architecture-and-construction-computer-aided-design","description":"Computer-aided design (CAD) is the use of computers (or workstations) to aid in the creation, modification, analysis or optimization of a design. CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation and to create a database for manufacturing. CAD output is often in the form of electronic files for print, machining or other manufacturing operations. The term CADD (for Computer Aided Design and Drafting) is also used.\r\nCAD may be used to design curves and figures in two-dimensional (2D) space or curves, surfaces and solids in three-dimensional (3D) space.\r\nCAD is an important industrial art extensively used in many applications, including architectural design, prosthetics and many more.\r\nSoftware for architecture - systems designed specifically for architects, whose tools allow you to build drawings and models from familiar objects (walls, columns, floors, etc.), to design buildings and facilities for industrial and civil construction. These programs have the tools to build three-dimensional models and obtain all the necessary working documentation and support modern technology of information modeling of buildings.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What is a CAD drafter or CAD Designer?</span></h1>\r\nEverything around us that is manufactured begins with an idea in a written plan. When these plans require illustrations or drawings to convey meaning, a CAD drafter is needed to prepare these ideas in graphic forms of communication. Drafters translate ideas and rough sketches of other professionals, such as architects and engineers, into scaled detail (or working) drawings. A CAD designer often prepares the plans and rough sketches for an architect or engineer. The designer has more education and thus more responsibility than the drafter but less than an architect or engineer.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What software do architects use?</span></h1>\r\n<p class=\"align-left\">Before computer-aided design software, architects relied solely on hand drawings and handmade architecture models to communicate their designs. With the evolution of technology and the architecture industry, architectural drafting software has changed the way architects plan and design buildings. Implementing 2D and 3D architecture software allows designers to draft at greater speed, test ideas and determine consistent project workflows. Advancements in rendering software provide architects and their clients with the ability to visually experience designs before a project is realized.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Is CAD 2D or 3D?</span></h1>\r\n<p class=\"align-left\">A common misconception surrounding CAD is that it is a 3D architecture software modeling tool only. However, CAD can be used as a 2D drawing tool as well. Construction designers might use a CAD tool that only works in 2D while architects might work in a 3D software architecture tools that has a 2D converter. It is highly dependent upon the actual platform used. This can be convenient because a company might only use a 2D tool and can pay for that tool alone. However, as construction centers around 3D modeling software for architecture and informational models, it will be harder for companies who only to use a 2D tool.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is CAD used for in construction?</span></h1>\r\n<p class=\"align-left\">There are a lot of uses for CAD in construction. Subcontractor’s designers can take the drawings made by the architect and add in additional necessary details to ensure constructability. From there they have a plan that they can work off of and check their work against. Companies have already done this to a degree of success. Some companies were able to use a combination of drones and 3D models to notice issues with the construction. Specifically, a company can overlay their live drone footage with the model. They could note that the foundation would be off and make corrections.</p>\r\n<p class=\"align-left\">Architecture planning software benefits contractors because the drawings and plans can be easily stored in the cloud. This allows for contractors to use their plans at any location. Also, if they are included in a shared file for the project, they can easily see changes to the plans. So, a subcontractor could quickly determine which changes were made, by who, and how it will impact construction.</p>\r\n<p class=\"align-left\">Another benefit of professional architecture software is it is more accurate than manual drawings. It’s easier for construction design software than it is when it’s manual. And it’s easier for subcontractors to add details than it is in manual drawings.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What architects’ tools have been transformed by technology?</span></h1>\r\nWorking methods that previously resulted in only the documentation of an idea are now moving toward the realization of a full virtual copy of a building and all its complex components before a single nail is hammered. As such, architects’ tools that used to be physical, like pens and pencils, are now mere basics in a virtual toolbox with capabilities an analog architect couldn’t even fathom. The breakneck pace of this change is good reason to reflect on the history of these architect software virtual tools by comparing them to their physical forebears.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Arm vs. Dynamic Input. </span>Appearing like an alien appendage affixed to a drawing board, a drafting arm originally consolidated a variety of tasks completed with separate rulers, straightedges and protractors into a single versatile tool. AutoCAD’s crosshair reticle, for example, once relied on manual input with compass-style designations before it featured point-and-click functionality with real-time metrics following it around the screen.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Tape Measure vs. Surveying App.</span> Documenting an existing building in order to plan its transformation is likely one of the most frequent tasks architects complete. Until recently, the only way to correctly do this was by hand, with a tape measure, pen and paper. Since the advent of infrared scanners, depth-sensing cameras and software that can communicate with them, the time-intensive process of surveying an existing space has been cut to a fraction of what it once was.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Template vs. Premade 3-D Models.</span> In the days of hand-drafting, adding furniture to a drawing meant choosing an appropriately scaled object from a stencil and tracing it. Today’s sophisticated equivalent that architecture software programs offer allows an infinite number of premade models to be brought into a wide range of design software with a single click. Despite technological advances in this practice, the old method may actually be advantageous due to its reliance on abstraction because choosing realistically detailed furnishings for an early design scheme often prompts cosmetic decisions long before they need to be made.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Electric Eraser vs. Undo.</span> The most simple, and, for this reason, the most underappreciated, transformation an architect’s tools have undergone between physical and virtual methods is the ease with which one can now reverse the work they’ve done. Allowing what essentially amounts to time travel, the Undo function is universal to almost all software programs and as such is often taken for granted. Prior to this wonderful invention, the savviest architects wielded handheld electric erasers allowing them to salvage large drawing sets in the event of a drafting mistake or last-minute design change.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Blueprint Machine vs. Inkjet Plotter. </span>If you hang around an architecture firm long enough, you might hear older designers talk about using a blueprint machine. Originally the premier method for producing copies of drawings, blueprint machines involved rolling an original drawing through a chemical mixture that reproduced the image on a special type of paper. For some time now, digital plotters have removed manual labor from the equation, being fed information directly from a virtual drawing file.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Digitizer Tablet vs. Touchscreen Workstation.</span> Early iterations of digital drafting were often paired with a digitizer: a special keyboard that could choose commands or be directly drawn on. Software used in architecture eventually got better at incorporating a keyboard and mouse, but nowadays the tide might be turning back to a hands-on approach as devices like Microsoft’s Surface Studio are pushing an interface with touch-heavy tools just for architects. Though currently limited to apps for sketching and drawing review, the way architects work could be changed forever if a large influential company like Autodesk or Graphisoft were to fully embrace touchscreen capabilities.</li></ul>\r\n\r\n<p class=\"align-left\"><br /><br /> <br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CAD.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":180,"title":"Inability to forecast execution timelines"},{"id":375,"title":"No support for mobile and remote users"},{"id":377,"title":"Separate communications channels"},{"id":398,"title":"Poor communication and coordination among staff"},{"id":399,"title":"No e-document flow"},{"id":400,"title":"High costs"}]}},"categories":[{"id":780,"title":"CAD for architecture and construction - Computer-Aided Design","alias":"cad-for-architecture-and-construction-computer-aided-design","description":"Computer-aided design (CAD) is the use of computers (or workstations) to aid in the creation, modification, analysis or optimization of a design. CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation and to create a database for manufacturing. CAD output is often in the form of electronic files for print, machining or other manufacturing operations. The term CADD (for Computer Aided Design and Drafting) is also used.\r\nCAD may be used to design curves and figures in two-dimensional (2D) space or curves, surfaces and solids in three-dimensional (3D) space.\r\nCAD is an important industrial art extensively used in many applications, including architectural design, prosthetics and many more.\r\nSoftware for architecture - systems designed specifically for architects, whose tools allow you to build drawings and models from familiar objects (walls, columns, floors, etc.), to design buildings and facilities for industrial and civil construction. These programs have the tools to build three-dimensional models and obtain all the necessary working documentation and support modern technology of information modeling of buildings.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What is a CAD drafter or CAD Designer?</span></h1>\r\nEverything around us that is manufactured begins with an idea in a written plan. When these plans require illustrations or drawings to convey meaning, a CAD drafter is needed to prepare these ideas in graphic forms of communication. Drafters translate ideas and rough sketches of other professionals, such as architects and engineers, into scaled detail (or working) drawings. A CAD designer often prepares the plans and rough sketches for an architect or engineer. The designer has more education and thus more responsibility than the drafter but less than an architect or engineer.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What software do architects use?</span></h1>\r\n<p class=\"align-left\">Before computer-aided design software, architects relied solely on hand drawings and handmade architecture models to communicate their designs. With the evolution of technology and the architecture industry, architectural drafting software has changed the way architects plan and design buildings. Implementing 2D and 3D architecture software allows designers to draft at greater speed, test ideas and determine consistent project workflows. Advancements in rendering software provide architects and their clients with the ability to visually experience designs before a project is realized.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Is CAD 2D or 3D?</span></h1>\r\n<p class=\"align-left\">A common misconception surrounding CAD is that it is a 3D architecture software modeling tool only. However, CAD can be used as a 2D drawing tool as well. Construction designers might use a CAD tool that only works in 2D while architects might work in a 3D software architecture tools that has a 2D converter. It is highly dependent upon the actual platform used. This can be convenient because a company might only use a 2D tool and can pay for that tool alone. However, as construction centers around 3D modeling software for architecture and informational models, it will be harder for companies who only to use a 2D tool.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is CAD used for in construction?</span></h1>\r\n<p class=\"align-left\">There are a lot of uses for CAD in construction. Subcontractor’s designers can take the drawings made by the architect and add in additional necessary details to ensure constructability. From there they have a plan that they can work off of and check their work against. Companies have already done this to a degree of success. Some companies were able to use a combination of drones and 3D models to notice issues with the construction. Specifically, a company can overlay their live drone footage with the model. They could note that the foundation would be off and make corrections.</p>\r\n<p class=\"align-left\">Architecture planning software benefits contractors because the drawings and plans can be easily stored in the cloud. This allows for contractors to use their plans at any location. Also, if they are included in a shared file for the project, they can easily see changes to the plans. So, a subcontractor could quickly determine which changes were made, by who, and how it will impact construction.</p>\r\n<p class=\"align-left\">Another benefit of professional architecture software is it is more accurate than manual drawings. It’s easier for construction design software than it is when it’s manual. And it’s easier for subcontractors to add details than it is in manual drawings.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What architects’ tools have been transformed by technology?</span></h1>\r\nWorking methods that previously resulted in only the documentation of an idea are now moving toward the realization of a full virtual copy of a building and all its complex components before a single nail is hammered. As such, architects’ tools that used to be physical, like pens and pencils, are now mere basics in a virtual toolbox with capabilities an analog architect couldn’t even fathom. The breakneck pace of this change is good reason to reflect on the history of these architect software virtual tools by comparing them to their physical forebears.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Arm vs. Dynamic Input. </span>Appearing like an alien appendage affixed to a drawing board, a drafting arm originally consolidated a variety of tasks completed with separate rulers, straightedges and protractors into a single versatile tool. AutoCAD’s crosshair reticle, for example, once relied on manual input with compass-style designations before it featured point-and-click functionality with real-time metrics following it around the screen.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Tape Measure vs. Surveying App.</span> Documenting an existing building in order to plan its transformation is likely one of the most frequent tasks architects complete. Until recently, the only way to correctly do this was by hand, with a tape measure, pen and paper. Since the advent of infrared scanners, depth-sensing cameras and software that can communicate with them, the time-intensive process of surveying an existing space has been cut to a fraction of what it once was.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Template vs. Premade 3-D Models.</span> In the days of hand-drafting, adding furniture to a drawing meant choosing an appropriately scaled object from a stencil and tracing it. Today’s sophisticated equivalent that architecture software programs offer allows an infinite number of premade models to be brought into a wide range of design software with a single click. Despite technological advances in this practice, the old method may actually be advantageous due to its reliance on abstraction because choosing realistically detailed furnishings for an early design scheme often prompts cosmetic decisions long before they need to be made.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Electric Eraser vs. Undo.</span> The most simple, and, for this reason, the most underappreciated, transformation an architect’s tools have undergone between physical and virtual methods is the ease with which one can now reverse the work they’ve done. Allowing what essentially amounts to time travel, the Undo function is universal to almost all software programs and as such is often taken for granted. Prior to this wonderful invention, the savviest architects wielded handheld electric erasers allowing them to salvage large drawing sets in the event of a drafting mistake or last-minute design change.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Blueprint Machine vs. Inkjet Plotter. </span>If you hang around an architecture firm long enough, you might hear older designers talk about using a blueprint machine. Originally the premier method for producing copies of drawings, blueprint machines involved rolling an original drawing through a chemical mixture that reproduced the image on a special type of paper. For some time now, digital plotters have removed manual labor from the equation, being fed information directly from a virtual drawing file.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Digitizer Tablet vs. Touchscreen Workstation.</span> Early iterations of digital drafting were often paired with a digitizer: a special keyboard that could choose commands or be directly drawn on. Software used in architecture eventually got better at incorporating a keyboard and mouse, but nowadays the tide might be turning back to a hands-on approach as devices like Microsoft’s Surface Studio are pushing an interface with touch-heavy tools just for architects. Though currently limited to apps for sketching and drawing review, the way architects work could be changed forever if a large influential company like Autodesk or Graphisoft were to fully embrace touchscreen capabilities.</li></ul>\r\n\r\n<p class=\"align-left\"><br /><br /> <br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CAD.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://damassets.autodesk.net/content/dam/autodesk/www/products/autodesk-revit-family/docs/pdf/shop-architects-customer-story-en.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":568,"title":"Autodesk Fusion 360 for Groovemade Design Company","description":"In Portland, Oregon, the team at Grovemade has spent the past seven years perfecting designs for phone cases and desk objects like keyboard trays, pencil cups, and monitor stands. The woodwork that has become their trademark is finicky, difficult, and endlessly detailed.\r\nDuring the design process, the Grovemade team typically goes back and forth between CAD and physical models. That process starts with sketches, cardboard models, and mockups made from blocks of foam or wood, then iterates back into the software as they add details.\r\nThe team loves how Fusion 360 combines CAD with CAM. That seamless integration makes it incredibly easy — and fast — to make changes in the design and then machine another prototype immediately using their in-house CNC equipment.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“We need to be able to make changes quickly and try it again,” the owner Tomita explains. He adds that they routinely go from CAD to CAM to machining to holding it in their hands all in the same day — “which is absolutely incredible.”</span></span>\r\nGrovemade used to work with a combination of different 3D design and CNC packages, <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Tomita says, “but the software was so time-consuming that we wouldn’t do [prototyping] a lot of times.”</span></span> Fusion 360 gave them an all-in-one application that, besides being far less expensive, allowed them to avoid that friction and go straight to machining anytime they want. And because it’s all integrated, they don’t have to worry about migrating design changes across multiple pieces of software.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“If we change one thing, we don’t have to redo it on the other,” Tomita says. “It’s pretty massive.”</span></span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">All in all, he adds, Fusion 360 “fits right in with the scale of our business”.</span></span>","alias":"autodesk-fusion-360-for-groovemade-design-company","roi":0,"seo":{"title":"Autodesk Fusion 360 for Groovemade Design Company","keywords":"","description":"In Portland, Oregon, the team at Grovemade has spent the past seven years perfecting designs for phone cases and desk objects like keyboard trays, pencil cups, and monitor stands. The woodwork that has become their trademark is finicky, difficult, and endlessl","og:title":"Autodesk Fusion 360 for Groovemade Design Company","og:description":"In Portland, Oregon, the team at Grovemade has spent the past seven years perfecting designs for phone cases and desk objects like keyboard trays, pencil cups, and monitor stands. The woodwork that has become their trademark is finicky, difficult, and endlessl"},"deal_info":"","user":{"id":4466,"title":"Groovemade (User)","logoURL":"https://old.roi4cio.com/uploads/roi/company/Grovemade__logo_.jpg","alias":"groovemade-user","address":"","roles":[],"description":" Grovemade is a design & manufacturing company based in Portland, Oregon. Since 2009, small team has been designing and building innovative products for your work, home, and life. We believe design inspires what you do. We’re independent and vertically integrated, from design to manufacturing, allowing us to make things that couldn’t exist otherwise. We value the fulfillment from good work well done, and the happiness of our people and our customers, the heart behind what we produce. A small and passionate team can make incredible products.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://grovemade.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Groovemade (User)","keywords":"","description":" Grovemade is a design & manufacturing company based in Portland, Oregon. Since 2009, small team has been designing and building innovative products for your work, home, and life. We believe design inspires what you do. We’re independent and vertically int","og:title":"Groovemade (User)","og:description":" Grovemade is a design & manufacturing company based in Portland, Oregon. Since 2009, small team has been designing and building innovative products for your work, home, and life. We believe design inspires what you do. We’re independent and vertically int","og:image":"https://old.roi4cio.com/uploads/roi/company/Grovemade__logo_.jpg"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":180,"title":"Autodesk","logoURL":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg","alias":"autodesk","address":"","roles":[],"description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a gallery of its customers' work in its San Francisco building. The company has offices worldwide, with U.S. locations in Northern California, Oregon, Colorado, Texas and in New England in New Hampshire and Massachusetts, and Canada locations in Ontario, Quebec, and Alberta.","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":33,"b4r":0,"categories":{},"companyUrl":"www.autodesk.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Autodesk","keywords":"Autodesk, California, software, locations, with, worldwide, building, company","description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:title":"Autodesk","og:description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:image":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg"},"eventUrl":""}],"products":[{"id":1012,"logo":false,"scheme":false,"title":"Autodesk Fusion 360","vendorVerified":0,"rating":"3.00","implementationsCount":6,"suppliersCount":0,"alias":"autodesk-fusion-360","companyTypes":[],"description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Quickly iterate on design ideas with sculpting tools to explore form and modeling tools to create finishing features.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Engineer & simulate </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Test fit and motion, perform simulations, create assemblies, make photorealistic renderings and animations.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> CAM </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Create toolpaths to machine your components or use the 3D printing workflow to create a prototype.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> Collaborate & manage </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Bring design teams together in a hybrid environment that harnesses the power of the cloud when necessary and uses local resources when it makes sense.</span></p>","shortDescription":"Fusion 360TM is the first 3D CAD, CAM, and CAE tool of its kind. It connects your entire product development process in a single cloud-based platform that works on both Mac and PC.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Autodesk Fusion 360","keywords":"create, design, when, tools, prototype, Collaborate, manage, teams","description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style","og:title":"Autodesk Fusion 360","og:description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style"},"eventUrl":"","translationId":1012,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":581,"title":"3D model Design","alias":"3d-model-design","description":" In 3D computer graphics, <span style=\"font-weight: bold; \">3D modeling</span> is the process of developing a mathematical representation of any surface of an object (either inanimate or living) in three dimensions via specialized software. The product is called a <span style=\"font-weight: bold; \">3D model.</span> Someone who works with 3D models may be referred to as a <span style=\"font-weight: bold; \">3D artist.</span> It can be displayed as a two-dimensional image through a process called 3D rendering or used in a computer simulation of physical phenomena. The model can also be physically created using 3D printing devices.\r\n3D modeling can be achieved manually with specialized 3D model design software, such as <span style=\"font-weight: bold; \">computer-aided design</span> (CAD) programs, that lets an artist create and deform polygonal surfaces or by scanning real-world objects into a set of data points that can be used to represent the object digitally.\r\nSoftware to create 3D models is a class of 3D computer graphics software used to produce 3D models. Individual programs of this class are called <span style=\"font-weight: bold; \">modeling applications</span> or <span style=\"font-weight: bold; \">modelers</span>.\r\nThree-dimensional (3D) models represent a physical body using a collection of points in 3D space, connected by various geometric entities such as triangles, lines, curved surfaces, etc. Being a collection of data (points and other information), 3D models can be created by hand, algorithmically (procedural modeling), or scanned. Their surfaces may be further defined with texture mapping.\r\nAlthough complex mathematical formulas are at the foundation of 3D drawing software, the programs automate computation for users and have tool-based user interfaces. 3D models are an output of 3D modeling and are based on a variety of digital representations. Boundary representation (B-rep) uses mathematically defined surfaces such as cones, spheres and NURBS (non-uniform rational basis spline) which are connected by topology to accurately represent objects as water-tight volumes. B-rep models are the preferred solution for engineering, and many 3D modeling applications for the design, simulation and manufacture of consumer and industrial products are B-rep based. \r\nVirtual 3D models can be turned into physical objects through 3D printing or traditional manufacturing processes. Models can also be converted into a static image through 3D rendering, commonly used to create photo-realistic representation for sales, marketing and eCommerce applications. 3D models can be created by the process of reverse engineering, in which 3D scanning technology is used to create digital replicas of real-world objects, including manufactured parts and assemblies, free-form models designed in clay and human anatomy. Modern 3d modeling and animation tools create and interact with a “digital twin”, which is used to develop, test, simulate and manufacture its real world counterpart as part of the product lifecycle.\r\n3D modeling is used in a wide range of fields, including engineering, architecture, entertainment, film, special effects, game development, and commercial advertising. It is an integral part of many creative careers. Engineers and architects use it to plan and design their work. Animators and game designers rely on 3D modeling tools to bring their ideas to life. And just about every Hollywood blockbuster uses 3D modeling for special effects, to cut costs, and to speed up production.\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Criteria to consider when choosing between 3D software programs</h1>\r\nThere is a wide range of 3D modeling and animation software addressing <span style=\"font-weight: bold; \">different fields of activity</span>. For instance, there is software dedicated to mechanical design, to engineering design, to civil engineering, to product design, to industrial design or to graphic design. The first thing to take into account is to select a design <span style=\"font-weight: bold; \">software targeted to your project</span>. Each field of activity has different needs. For example, a project about the creation of jewelry does not require the same 3D object software as a project of creation of aircraft models.\r\nAre you using a 3D drawing software for 3d printing, Laser Cutting or just for creating some digital art? Always take into account<span style=\"font-weight: bold; \"> the necessities of the technology</span> that you are designing for. Then, you can think: what is the <span style=\"font-weight: bold; \">budget</span> to select 3D modeling programs? If you afford to, you can pay for the required subscription. Alternatively, you can use the student license or the educational license that some design suites provide. Otherwise, there is various good quality 3D modeling app and software that is available for free and is equally good as professional options. In that case, you would like to get to know the software by downloading the limitied time and/or restricted functionality version that most vendors provide.\r\nChoose 3D design programs that are <span style=\"font-weight: bold; \">compatible with the Operating System</span> (OS) you are using, since not all the packages are meant to be used by all OS: Windows, Mac, Linux. Last but not least, choose a 3D modeling program according to your age and <span style=\"font-weight: bold; \">level of expertise.</span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_3D_model_Design.png"},{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":10,"title":"Ensure Compliance"},{"id":252,"title":"Increase Customer Base"},{"id":307,"title":"Enhance Competitive Ability"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":400,"title":"High costs"},{"id":401,"title":"No control over implementation"}]}},"categories":[{"id":581,"title":"3D model Design","alias":"3d-model-design","description":" In 3D computer graphics, <span style=\"font-weight: bold; \">3D modeling</span> is the process of developing a mathematical representation of any surface of an object (either inanimate or living) in three dimensions via specialized software. The product is called a <span style=\"font-weight: bold; \">3D model.</span> Someone who works with 3D models may be referred to as a <span style=\"font-weight: bold; \">3D artist.</span> It can be displayed as a two-dimensional image through a process called 3D rendering or used in a computer simulation of physical phenomena. The model can also be physically created using 3D printing devices.\r\n3D modeling can be achieved manually with specialized 3D model design software, such as <span style=\"font-weight: bold; \">computer-aided design</span> (CAD) programs, that lets an artist create and deform polygonal surfaces or by scanning real-world objects into a set of data points that can be used to represent the object digitally.\r\nSoftware to create 3D models is a class of 3D computer graphics software used to produce 3D models. Individual programs of this class are called <span style=\"font-weight: bold; \">modeling applications</span> or <span style=\"font-weight: bold; \">modelers</span>.\r\nThree-dimensional (3D) models represent a physical body using a collection of points in 3D space, connected by various geometric entities such as triangles, lines, curved surfaces, etc. Being a collection of data (points and other information), 3D models can be created by hand, algorithmically (procedural modeling), or scanned. Their surfaces may be further defined with texture mapping.\r\nAlthough complex mathematical formulas are at the foundation of 3D drawing software, the programs automate computation for users and have tool-based user interfaces. 3D models are an output of 3D modeling and are based on a variety of digital representations. Boundary representation (B-rep) uses mathematically defined surfaces such as cones, spheres and NURBS (non-uniform rational basis spline) which are connected by topology to accurately represent objects as water-tight volumes. B-rep models are the preferred solution for engineering, and many 3D modeling applications for the design, simulation and manufacture of consumer and industrial products are B-rep based. \r\nVirtual 3D models can be turned into physical objects through 3D printing or traditional manufacturing processes. Models can also be converted into a static image through 3D rendering, commonly used to create photo-realistic representation for sales, marketing and eCommerce applications. 3D models can be created by the process of reverse engineering, in which 3D scanning technology is used to create digital replicas of real-world objects, including manufactured parts and assemblies, free-form models designed in clay and human anatomy. Modern 3d modeling and animation tools create and interact with a “digital twin”, which is used to develop, test, simulate and manufacture its real world counterpart as part of the product lifecycle.\r\n3D modeling is used in a wide range of fields, including engineering, architecture, entertainment, film, special effects, game development, and commercial advertising. It is an integral part of many creative careers. Engineers and architects use it to plan and design their work. Animators and game designers rely on 3D modeling tools to bring their ideas to life. And just about every Hollywood blockbuster uses 3D modeling for special effects, to cut costs, and to speed up production.\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Criteria to consider when choosing between 3D software programs</h1>\r\nThere is a wide range of 3D modeling and animation software addressing <span style=\"font-weight: bold; \">different fields of activity</span>. For instance, there is software dedicated to mechanical design, to engineering design, to civil engineering, to product design, to industrial design or to graphic design. The first thing to take into account is to select a design <span style=\"font-weight: bold; \">software targeted to your project</span>. Each field of activity has different needs. For example, a project about the creation of jewelry does not require the same 3D object software as a project of creation of aircraft models.\r\nAre you using a 3D drawing software for 3d printing, Laser Cutting or just for creating some digital art? Always take into account<span style=\"font-weight: bold; \"> the necessities of the technology</span> that you are designing for. Then, you can think: what is the <span style=\"font-weight: bold; \">budget</span> to select 3D modeling programs? If you afford to, you can pay for the required subscription. Alternatively, you can use the student license or the educational license that some design suites provide. Otherwise, there is various good quality 3D modeling app and software that is available for free and is equally good as professional options. In that case, you would like to get to know the software by downloading the limitied time and/or restricted functionality version that most vendors provide.\r\nChoose 3D design programs that are <span style=\"font-weight: bold; \">compatible with the Operating System</span> (OS) you are using, since not all the packages are meant to be used by all OS: Windows, Mac, Linux. Last but not least, choose a 3D modeling program according to your age and <span style=\"font-weight: bold; \">level of expertise.</span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_3D_model_Design.png"},{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.autodesk.com/products/fusion-360/blog/grovemade-takes-woodworking-design-another-level-entirely/","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":574,"title":"Autodesk Fusion 360 for IT-company Scriba","description":"The iterative design approach followed by the Scriba team has dovetailed with their use of Fusion 360. It started when Craig (the owner) discovered an early version of the software a few years ago, and continued over time as the fledgling company received technical support — and encouragement — from Autodesk staff in San Francisco.\r\nNow the larger team counts on Fusion 360’s collaboration features to maintain the master model of the product and coordinate inputs received from team members and outside experts spread across Ireland and beyond. The software has also enabled the team to test out alternative components before completing final designs. This has extended to such fine details as identifying and visualizing overhangs and areas of low draft angles needing special attention, as well as simulating applied loads to identify high-stress areas where the product’s bendability called for precise changes in the geometry of the materials.\r\nIntegrated cloud rendering has given Scriba’s designers the ability to validate many aesthetic design changes rapidly, which was particularly important when they were finalizing the material finishes on the product. They also used Fusion 360 to prepare drawings for tooling that they then shared with their fabrication partners.","alias":"autodesk-fusion-360-for-it-company-scriba","roi":0,"seo":{"title":"Autodesk Fusion 360 for IT-company Scriba","keywords":"","description":"The iterative design approach followed by the Scriba team has dovetailed with their use of Fusion 360. It started when Craig (the owner) discovered an early version of the software a few years ago, and continued over time as the fledgling company received tech","og:title":"Autodesk Fusion 360 for IT-company Scriba","og:description":"The iterative design approach followed by the Scriba team has dovetailed with their use of Fusion 360. It started when Craig (the owner) discovered an early version of the software a few years ago, and continued over time as the fledgling company received tech"},"deal_info":"","user":{"id":4469,"title":"Scriba (User)","logoURL":"https://old.roi4cio.com/uploads/roi/company/scriba__logo_.jpg","alias":"scriba-user","address":"","roles":[],"description":"For 32 years, Scriba's portfolio of offerings has covered all IT needs, both hardware-based and at a very high level of service, whether through cloud solutions or total or partial outsourcing systems. With its seven regional agencies, Scriba is your local partner. The innovation of our offers, whether in industrialized mode or in total customization, ensures solutions that meet your needs, in the simplification of the use of your information system. With our trained and certified teams, you are guaranteed to be accompanied from the identification of a need or a problem to the implementation of the solution, and throughout the life cycle of these products.\r\nSource: https://www.linkedin.com/company/scriba/","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.getscriba.com/index.html","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Scriba (User)","keywords":"","description":"For 32 years, Scriba's portfolio of offerings has covered all IT needs, both hardware-based and at a very high level of service, whether through cloud solutions or total or partial outsourcing systems. With its seven regional agencies, Scriba is your local par","og:title":"Scriba (User)","og:description":"For 32 years, Scriba's portfolio of offerings has covered all IT needs, both hardware-based and at a very high level of service, whether through cloud solutions or total or partial outsourcing systems. With its seven regional agencies, Scriba is your local par","og:image":"https://old.roi4cio.com/uploads/roi/company/scriba__logo_.jpg"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":180,"title":"Autodesk","logoURL":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg","alias":"autodesk","address":"","roles":[],"description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a gallery of its customers' work in its San Francisco building. The company has offices worldwide, with U.S. locations in Northern California, Oregon, Colorado, Texas and in New England in New Hampshire and Massachusetts, and Canada locations in Ontario, Quebec, and Alberta.","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":33,"b4r":0,"categories":{},"companyUrl":"www.autodesk.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Autodesk","keywords":"Autodesk, California, software, locations, with, worldwide, building, company","description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:title":"Autodesk","og:description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:image":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg"},"eventUrl":""}],"products":[{"id":1012,"logo":false,"scheme":false,"title":"Autodesk Fusion 360","vendorVerified":0,"rating":"3.00","implementationsCount":6,"suppliersCount":0,"alias":"autodesk-fusion-360","companyTypes":[],"description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Quickly iterate on design ideas with sculpting tools to explore form and modeling tools to create finishing features.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Engineer & simulate </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Test fit and motion, perform simulations, create assemblies, make photorealistic renderings and animations.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> CAM </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Create toolpaths to machine your components or use the 3D printing workflow to create a prototype.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> Collaborate & manage </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Bring design teams together in a hybrid environment that harnesses the power of the cloud when necessary and uses local resources when it makes sense.</span></p>","shortDescription":"Fusion 360TM is the first 3D CAD, CAM, and CAE tool of its kind. It connects your entire product development process in a single cloud-based platform that works on both Mac and PC.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Autodesk Fusion 360","keywords":"create, design, when, tools, prototype, Collaborate, manage, teams","description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style","og:title":"Autodesk Fusion 360","og:description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style"},"eventUrl":"","translationId":1012,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":581,"title":"3D model Design","alias":"3d-model-design","description":" In 3D computer graphics, <span style=\"font-weight: bold; \">3D modeling</span> is the process of developing a mathematical representation of any surface of an object (either inanimate or living) in three dimensions via specialized software. The product is called a <span style=\"font-weight: bold; \">3D model.</span> Someone who works with 3D models may be referred to as a <span style=\"font-weight: bold; \">3D artist.</span> It can be displayed as a two-dimensional image through a process called 3D rendering or used in a computer simulation of physical phenomena. The model can also be physically created using 3D printing devices.\r\n3D modeling can be achieved manually with specialized 3D model design software, such as <span style=\"font-weight: bold; \">computer-aided design</span> (CAD) programs, that lets an artist create and deform polygonal surfaces or by scanning real-world objects into a set of data points that can be used to represent the object digitally.\r\nSoftware to create 3D models is a class of 3D computer graphics software used to produce 3D models. Individual programs of this class are called <span style=\"font-weight: bold; \">modeling applications</span> or <span style=\"font-weight: bold; \">modelers</span>.\r\nThree-dimensional (3D) models represent a physical body using a collection of points in 3D space, connected by various geometric entities such as triangles, lines, curved surfaces, etc. Being a collection of data (points and other information), 3D models can be created by hand, algorithmically (procedural modeling), or scanned. Their surfaces may be further defined with texture mapping.\r\nAlthough complex mathematical formulas are at the foundation of 3D drawing software, the programs automate computation for users and have tool-based user interfaces. 3D models are an output of 3D modeling and are based on a variety of digital representations. Boundary representation (B-rep) uses mathematically defined surfaces such as cones, spheres and NURBS (non-uniform rational basis spline) which are connected by topology to accurately represent objects as water-tight volumes. B-rep models are the preferred solution for engineering, and many 3D modeling applications for the design, simulation and manufacture of consumer and industrial products are B-rep based. \r\nVirtual 3D models can be turned into physical objects through 3D printing or traditional manufacturing processes. Models can also be converted into a static image through 3D rendering, commonly used to create photo-realistic representation for sales, marketing and eCommerce applications. 3D models can be created by the process of reverse engineering, in which 3D scanning technology is used to create digital replicas of real-world objects, including manufactured parts and assemblies, free-form models designed in clay and human anatomy. Modern 3d modeling and animation tools create and interact with a “digital twin”, which is used to develop, test, simulate and manufacture its real world counterpart as part of the product lifecycle.\r\n3D modeling is used in a wide range of fields, including engineering, architecture, entertainment, film, special effects, game development, and commercial advertising. It is an integral part of many creative careers. Engineers and architects use it to plan and design their work. Animators and game designers rely on 3D modeling tools to bring their ideas to life. And just about every Hollywood blockbuster uses 3D modeling for special effects, to cut costs, and to speed up production.\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Criteria to consider when choosing between 3D software programs</h1>\r\nThere is a wide range of 3D modeling and animation software addressing <span style=\"font-weight: bold; \">different fields of activity</span>. For instance, there is software dedicated to mechanical design, to engineering design, to civil engineering, to product design, to industrial design or to graphic design. The first thing to take into account is to select a design <span style=\"font-weight: bold; \">software targeted to your project</span>. Each field of activity has different needs. For example, a project about the creation of jewelry does not require the same 3D object software as a project of creation of aircraft models.\r\nAre you using a 3D drawing software for 3d printing, Laser Cutting or just for creating some digital art? Always take into account<span style=\"font-weight: bold; \"> the necessities of the technology</span> that you are designing for. Then, you can think: what is the <span style=\"font-weight: bold; \">budget</span> to select 3D modeling programs? If you afford to, you can pay for the required subscription. Alternatively, you can use the student license or the educational license that some design suites provide. Otherwise, there is various good quality 3D modeling app and software that is available for free and is equally good as professional options. In that case, you would like to get to know the software by downloading the limitied time and/or restricted functionality version that most vendors provide.\r\nChoose 3D design programs that are <span style=\"font-weight: bold; \">compatible with the Operating System</span> (OS) you are using, since not all the packages are meant to be used by all OS: Windows, Mac, Linux. Last but not least, choose a 3D modeling program according to your age and <span style=\"font-weight: bold; \">level of expertise.</span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_3D_model_Design.png"},{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":10,"title":"Ensure Compliance"},{"id":307,"title":"Enhance Competitive Ability"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":400,"title":"High costs"},{"id":401,"title":"No control over implementation"}]}},"categories":[{"id":581,"title":"3D model Design","alias":"3d-model-design","description":" In 3D computer graphics, <span style=\"font-weight: bold; \">3D modeling</span> is the process of developing a mathematical representation of any surface of an object (either inanimate or living) in three dimensions via specialized software. The product is called a <span style=\"font-weight: bold; \">3D model.</span> Someone who works with 3D models may be referred to as a <span style=\"font-weight: bold; \">3D artist.</span> It can be displayed as a two-dimensional image through a process called 3D rendering or used in a computer simulation of physical phenomena. The model can also be physically created using 3D printing devices.\r\n3D modeling can be achieved manually with specialized 3D model design software, such as <span style=\"font-weight: bold; \">computer-aided design</span> (CAD) programs, that lets an artist create and deform polygonal surfaces or by scanning real-world objects into a set of data points that can be used to represent the object digitally.\r\nSoftware to create 3D models is a class of 3D computer graphics software used to produce 3D models. Individual programs of this class are called <span style=\"font-weight: bold; \">modeling applications</span> or <span style=\"font-weight: bold; \">modelers</span>.\r\nThree-dimensional (3D) models represent a physical body using a collection of points in 3D space, connected by various geometric entities such as triangles, lines, curved surfaces, etc. Being a collection of data (points and other information), 3D models can be created by hand, algorithmically (procedural modeling), or scanned. Their surfaces may be further defined with texture mapping.\r\nAlthough complex mathematical formulas are at the foundation of 3D drawing software, the programs automate computation for users and have tool-based user interfaces. 3D models are an output of 3D modeling and are based on a variety of digital representations. Boundary representation (B-rep) uses mathematically defined surfaces such as cones, spheres and NURBS (non-uniform rational basis spline) which are connected by topology to accurately represent objects as water-tight volumes. B-rep models are the preferred solution for engineering, and many 3D modeling applications for the design, simulation and manufacture of consumer and industrial products are B-rep based. \r\nVirtual 3D models can be turned into physical objects through 3D printing or traditional manufacturing processes. Models can also be converted into a static image through 3D rendering, commonly used to create photo-realistic representation for sales, marketing and eCommerce applications. 3D models can be created by the process of reverse engineering, in which 3D scanning technology is used to create digital replicas of real-world objects, including manufactured parts and assemblies, free-form models designed in clay and human anatomy. Modern 3d modeling and animation tools create and interact with a “digital twin”, which is used to develop, test, simulate and manufacture its real world counterpart as part of the product lifecycle.\r\n3D modeling is used in a wide range of fields, including engineering, architecture, entertainment, film, special effects, game development, and commercial advertising. It is an integral part of many creative careers. Engineers and architects use it to plan and design their work. Animators and game designers rely on 3D modeling tools to bring their ideas to life. And just about every Hollywood blockbuster uses 3D modeling for special effects, to cut costs, and to speed up production.\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Criteria to consider when choosing between 3D software programs</h1>\r\nThere is a wide range of 3D modeling and animation software addressing <span style=\"font-weight: bold; \">different fields of activity</span>. For instance, there is software dedicated to mechanical design, to engineering design, to civil engineering, to product design, to industrial design or to graphic design. The first thing to take into account is to select a design <span style=\"font-weight: bold; \">software targeted to your project</span>. Each field of activity has different needs. For example, a project about the creation of jewelry does not require the same 3D object software as a project of creation of aircraft models.\r\nAre you using a 3D drawing software for 3d printing, Laser Cutting or just for creating some digital art? Always take into account<span style=\"font-weight: bold; \"> the necessities of the technology</span> that you are designing for. Then, you can think: what is the <span style=\"font-weight: bold; \">budget</span> to select 3D modeling programs? If you afford to, you can pay for the required subscription. Alternatively, you can use the student license or the educational license that some design suites provide. Otherwise, there is various good quality 3D modeling app and software that is available for free and is equally good as professional options. In that case, you would like to get to know the software by downloading the limitied time and/or restricted functionality version that most vendors provide.\r\nChoose 3D design programs that are <span style=\"font-weight: bold; \">compatible with the Operating System</span> (OS) you are using, since not all the packages are meant to be used by all OS: Windows, Mac, Linux. Last but not least, choose a 3D modeling program according to your age and <span style=\"font-weight: bold; \">level of expertise.</span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_3D_model_Design.png"},{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.autodesk.com/products/fusion-360/blog/scriba-aims-reinvent-stylus-designers/","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":572,"title":"Autodesk Fusion 360 for motorcycle parts manufacturer MJK Performance","description":"Up in Alberta, Canada, motorcycle designer Dale Yamada and machinist Phil Butterworth are taking aftermarket parts for Harley-Davidsons to a new level. After they noticed that <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“there’s nothing cool on the market,”</span></span> Butterworth says, their MJK Performance machine shop began making “cool, weird, technical, mechanical-looking parts” for Harley enthusiasts.\r\n<span style=\"font-weight: bold;\">Using Fusion 360 for CAD and CAM</span>\r\nWhen Butterworth lies in bed and has more ideas pop into his head, he gets back up and works on designs. This is made much easier because he and Yamada use Fusion 360 on their computers both at home and in the shop, so the designs can be shared instantly.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“It so easy, so user friendly,” Butterworth says, describing Fusion 360 as “hands-down” better than other CAD and CAM programs he’s used over the years. “The design side is so easy, and then to have the CAM side right there—and 5-axis.” The last part is especially important to him, given that 5-axis milling software alone can cost tens of thousands of dollars. “If we had to do this any other way,” he adds, “we just couldn’t afford it.”</span></span>\r\nThe two partners iterate quickly through designs, and Butterworth says he often likes using the branch feature to make five or six designs to try out different concepts before weeding them down. He also relies heavily on the rendering features, which makes it easy for him to<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\"> “see exactly what something will look like before it’s made.”</span></span>\r\nIn the bigger picture, the software “definitely speeds up the process on our end” by saving them many hours across the steps of design, rendering, and machining. <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“I can have something from design stage to off the machine in one hour, if I’m working hard,” Butterworth says. “Having everything in one software is perfect.”</span></span>","alias":"autodesk-fusion-360-for-motorcycle-parts-manufacturer-mjk-performance","roi":0,"seo":{"title":"Autodesk Fusion 360 for motorcycle parts manufacturer MJK Performance","keywords":"","description":"Up in Alberta, Canada, motorcycle designer Dale Yamada and machinist Phil Butterworth are taking aftermarket parts for Harley-Davidsons to a new level. After they noticed that <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“there’s nothing ","og:title":"Autodesk Fusion 360 for motorcycle parts manufacturer MJK Performance","og:description":"Up in Alberta, Canada, motorcycle designer Dale Yamada and machinist Phil Butterworth are taking aftermarket parts for Harley-Davidsons to a new level. After they noticed that <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“there’s nothing "},"deal_info":"","user":{"id":4468,"title":"MJK Performance (User)","logoURL":"https://old.roi4cio.com/uploads/roi/company/MJK_Performance__logo_.png","alias":"mjk-performance-user","address":"","roles":[],"description":" MJK Performance is located in Calgary, Alberta. It is a family owned business which is operated by us, Dale Yamada and Michelle Martin. We started the company (Mad Jap Kustoms Inc which is doing business as MJK Performance) in 2007 and have been in our current location since 2012. We rebranded our company Mad Jap Kustoms Inc in February 2017 to MJK Performance as we felt it better represented the direction the company was going in designing and CNC machining a new product line of Performance Bagger parts.\r\nWe pride ourselves on exceptional customer service and believe our customers deserve the highest quality and craftsmanship in everything we do.\r\nWe are excited to offer our new line up of high quality, precision CNC machined motorcycle parts to our customers.\r\nSource: http://www.mjkperformance.com/service/about/","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.mjkperformance.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"MJK Performance (User)","keywords":"","description":" MJK Performance is located in Calgary, Alberta. It is a family owned business which is operated by us, Dale Yamada and Michelle Martin. We started the company (Mad Jap Kustoms Inc which is doing business as MJK Performance) in 2007 and have been in our curren","og:title":"MJK Performance (User)","og:description":" MJK Performance is located in Calgary, Alberta. It is a family owned business which is operated by us, Dale Yamada and Michelle Martin. We started the company (Mad Jap Kustoms Inc which is doing business as MJK Performance) in 2007 and have been in our curren","og:image":"https://old.roi4cio.com/uploads/roi/company/MJK_Performance__logo_.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":180,"title":"Autodesk","logoURL":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg","alias":"autodesk","address":"","roles":[],"description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a gallery of its customers' work in its San Francisco building. The company has offices worldwide, with U.S. locations in Northern California, Oregon, Colorado, Texas and in New England in New Hampshire and Massachusetts, and Canada locations in Ontario, Quebec, and Alberta.","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":33,"b4r":0,"categories":{},"companyUrl":"www.autodesk.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Autodesk","keywords":"Autodesk, California, software, locations, with, worldwide, building, company","description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:title":"Autodesk","og:description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:image":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg"},"eventUrl":""}],"products":[{"id":1012,"logo":false,"scheme":false,"title":"Autodesk Fusion 360","vendorVerified":0,"rating":"3.00","implementationsCount":6,"suppliersCount":0,"alias":"autodesk-fusion-360","companyTypes":[],"description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Quickly iterate on design ideas with sculpting tools to explore form and modeling tools to create finishing features.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Engineer & simulate </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Test fit and motion, perform simulations, create assemblies, make photorealistic renderings and animations.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> CAM </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Create toolpaths to machine your components or use the 3D printing workflow to create a prototype.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> Collaborate & manage </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Bring design teams together in a hybrid environment that harnesses the power of the cloud when necessary and uses local resources when it makes sense.</span></p>","shortDescription":"Fusion 360TM is the first 3D CAD, CAM, and CAE tool of its kind. It connects your entire product development process in a single cloud-based platform that works on both Mac and PC.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Autodesk Fusion 360","keywords":"create, design, when, tools, prototype, Collaborate, manage, teams","description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style","og:title":"Autodesk Fusion 360","og:description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style"},"eventUrl":"","translationId":1012,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":581,"title":"3D model Design","alias":"3d-model-design","description":" In 3D computer graphics, <span style=\"font-weight: bold; \">3D modeling</span> is the process of developing a mathematical representation of any surface of an object (either inanimate or living) in three dimensions via specialized software. The product is called a <span style=\"font-weight: bold; \">3D model.</span> Someone who works with 3D models may be referred to as a <span style=\"font-weight: bold; \">3D artist.</span> It can be displayed as a two-dimensional image through a process called 3D rendering or used in a computer simulation of physical phenomena. The model can also be physically created using 3D printing devices.\r\n3D modeling can be achieved manually with specialized 3D model design software, such as <span style=\"font-weight: bold; \">computer-aided design</span> (CAD) programs, that lets an artist create and deform polygonal surfaces or by scanning real-world objects into a set of data points that can be used to represent the object digitally.\r\nSoftware to create 3D models is a class of 3D computer graphics software used to produce 3D models. Individual programs of this class are called <span style=\"font-weight: bold; \">modeling applications</span> or <span style=\"font-weight: bold; \">modelers</span>.\r\nThree-dimensional (3D) models represent a physical body using a collection of points in 3D space, connected by various geometric entities such as triangles, lines, curved surfaces, etc. Being a collection of data (points and other information), 3D models can be created by hand, algorithmically (procedural modeling), or scanned. Their surfaces may be further defined with texture mapping.\r\nAlthough complex mathematical formulas are at the foundation of 3D drawing software, the programs automate computation for users and have tool-based user interfaces. 3D models are an output of 3D modeling and are based on a variety of digital representations. Boundary representation (B-rep) uses mathematically defined surfaces such as cones, spheres and NURBS (non-uniform rational basis spline) which are connected by topology to accurately represent objects as water-tight volumes. B-rep models are the preferred solution for engineering, and many 3D modeling applications for the design, simulation and manufacture of consumer and industrial products are B-rep based. \r\nVirtual 3D models can be turned into physical objects through 3D printing or traditional manufacturing processes. Models can also be converted into a static image through 3D rendering, commonly used to create photo-realistic representation for sales, marketing and eCommerce applications. 3D models can be created by the process of reverse engineering, in which 3D scanning technology is used to create digital replicas of real-world objects, including manufactured parts and assemblies, free-form models designed in clay and human anatomy. Modern 3d modeling and animation tools create and interact with a “digital twin”, which is used to develop, test, simulate and manufacture its real world counterpart as part of the product lifecycle.\r\n3D modeling is used in a wide range of fields, including engineering, architecture, entertainment, film, special effects, game development, and commercial advertising. It is an integral part of many creative careers. Engineers and architects use it to plan and design their work. Animators and game designers rely on 3D modeling tools to bring their ideas to life. And just about every Hollywood blockbuster uses 3D modeling for special effects, to cut costs, and to speed up production.\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Criteria to consider when choosing between 3D software programs</h1>\r\nThere is a wide range of 3D modeling and animation software addressing <span style=\"font-weight: bold; \">different fields of activity</span>. For instance, there is software dedicated to mechanical design, to engineering design, to civil engineering, to product design, to industrial design or to graphic design. The first thing to take into account is to select a design <span style=\"font-weight: bold; \">software targeted to your project</span>. Each field of activity has different needs. For example, a project about the creation of jewelry does not require the same 3D object software as a project of creation of aircraft models.\r\nAre you using a 3D drawing software for 3d printing, Laser Cutting or just for creating some digital art? Always take into account<span style=\"font-weight: bold; \"> the necessities of the technology</span> that you are designing for. Then, you can think: what is the <span style=\"font-weight: bold; \">budget</span> to select 3D modeling programs? If you afford to, you can pay for the required subscription. Alternatively, you can use the student license or the educational license that some design suites provide. Otherwise, there is various good quality 3D modeling app and software that is available for free and is equally good as professional options. In that case, you would like to get to know the software by downloading the limitied time and/or restricted functionality version that most vendors provide.\r\nChoose 3D design programs that are <span style=\"font-weight: bold; \">compatible with the Operating System</span> (OS) you are using, since not all the packages are meant to be used by all OS: Windows, Mac, Linux. Last but not least, choose a 3D modeling program according to your age and <span style=\"font-weight: bold; \">level of expertise.</span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_3D_model_Design.png"},{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":10,"title":"Ensure Compliance"},{"id":307,"title":"Enhance Competitive Ability"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":400,"title":"High costs"},{"id":401,"title":"No control over implementation"}]}},"categories":[{"id":581,"title":"3D model Design","alias":"3d-model-design","description":" In 3D computer graphics, <span style=\"font-weight: bold; \">3D modeling</span> is the process of developing a mathematical representation of any surface of an object (either inanimate or living) in three dimensions via specialized software. The product is called a <span style=\"font-weight: bold; \">3D model.</span> Someone who works with 3D models may be referred to as a <span style=\"font-weight: bold; \">3D artist.</span> It can be displayed as a two-dimensional image through a process called 3D rendering or used in a computer simulation of physical phenomena. The model can also be physically created using 3D printing devices.\r\n3D modeling can be achieved manually with specialized 3D model design software, such as <span style=\"font-weight: bold; \">computer-aided design</span> (CAD) programs, that lets an artist create and deform polygonal surfaces or by scanning real-world objects into a set of data points that can be used to represent the object digitally.\r\nSoftware to create 3D models is a class of 3D computer graphics software used to produce 3D models. Individual programs of this class are called <span style=\"font-weight: bold; \">modeling applications</span> or <span style=\"font-weight: bold; \">modelers</span>.\r\nThree-dimensional (3D) models represent a physical body using a collection of points in 3D space, connected by various geometric entities such as triangles, lines, curved surfaces, etc. Being a collection of data (points and other information), 3D models can be created by hand, algorithmically (procedural modeling), or scanned. Their surfaces may be further defined with texture mapping.\r\nAlthough complex mathematical formulas are at the foundation of 3D drawing software, the programs automate computation for users and have tool-based user interfaces. 3D models are an output of 3D modeling and are based on a variety of digital representations. Boundary representation (B-rep) uses mathematically defined surfaces such as cones, spheres and NURBS (non-uniform rational basis spline) which are connected by topology to accurately represent objects as water-tight volumes. B-rep models are the preferred solution for engineering, and many 3D modeling applications for the design, simulation and manufacture of consumer and industrial products are B-rep based. \r\nVirtual 3D models can be turned into physical objects through 3D printing or traditional manufacturing processes. Models can also be converted into a static image through 3D rendering, commonly used to create photo-realistic representation for sales, marketing and eCommerce applications. 3D models can be created by the process of reverse engineering, in which 3D scanning technology is used to create digital replicas of real-world objects, including manufactured parts and assemblies, free-form models designed in clay and human anatomy. Modern 3d modeling and animation tools create and interact with a “digital twin”, which is used to develop, test, simulate and manufacture its real world counterpart as part of the product lifecycle.\r\n3D modeling is used in a wide range of fields, including engineering, architecture, entertainment, film, special effects, game development, and commercial advertising. It is an integral part of many creative careers. Engineers and architects use it to plan and design their work. Animators and game designers rely on 3D modeling tools to bring their ideas to life. And just about every Hollywood blockbuster uses 3D modeling for special effects, to cut costs, and to speed up production.\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Criteria to consider when choosing between 3D software programs</h1>\r\nThere is a wide range of 3D modeling and animation software addressing <span style=\"font-weight: bold; \">different fields of activity</span>. For instance, there is software dedicated to mechanical design, to engineering design, to civil engineering, to product design, to industrial design or to graphic design. The first thing to take into account is to select a design <span style=\"font-weight: bold; \">software targeted to your project</span>. Each field of activity has different needs. For example, a project about the creation of jewelry does not require the same 3D object software as a project of creation of aircraft models.\r\nAre you using a 3D drawing software for 3d printing, Laser Cutting or just for creating some digital art? Always take into account<span style=\"font-weight: bold; \"> the necessities of the technology</span> that you are designing for. Then, you can think: what is the <span style=\"font-weight: bold; \">budget</span> to select 3D modeling programs? If you afford to, you can pay for the required subscription. Alternatively, you can use the student license or the educational license that some design suites provide. Otherwise, there is various good quality 3D modeling app and software that is available for free and is equally good as professional options. In that case, you would like to get to know the software by downloading the limitied time and/or restricted functionality version that most vendors provide.\r\nChoose 3D design programs that are <span style=\"font-weight: bold; \">compatible with the Operating System</span> (OS) you are using, since not all the packages are meant to be used by all OS: Windows, Mac, Linux. Last but not least, choose a 3D modeling program according to your age and <span style=\"font-weight: bold; \">level of expertise.</span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_3D_model_Design.png"},{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.autodesk.com/products/fusion-360/blog/mjk-performance-motorcycle-parts/","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":563,"title":"Autodesk Fusion 360 for Orange County Choppers","description":"Orange County Choppers (OCC), the focus of Discovery Channel’s long-running American Chopper, is known for its Easy Rider-style motorcycles — complete with loud V-twin gas engines. The design emerged from the mind of OCC designer Jason Pohl as he riffed on the concept of “fusion” as part of OCC’s collaboration with the Autodesk Fusion 360 team.\r\nOCC has been making motorcycles since 1999, when company founder Paul Teutul Sr. started building custom bikes in the basement of his house. He started it for fun, but soon his unique designs attracted lots of attention. Discovery Channel took notice, and Teutul built a fabrication shop attached to his iron and steel business in upstate New York to keep up with demand.\r\nPohl first encountered OCC in 2004, not long after he had graduated from art school in his native Illinois. Paul was creating animations for a video game that featured OCC bikes. Teutul liked his work, and figured that the kind of 3D modeling used in the game could be translated into designs for real motorcycles.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“I’m way more of an artist than I am a geek,” Paul says, but even when he was in school he knew that he needed to learn software for the sake of his career. “I wanted to be a designer,” he says, “so I forcedmyself, kicking and screaming, to learn how to use the computer to my advantage.”</span></span>\r\nEarlier Paul met a member of the Autodesk staff who encouraged him to try Fusion 360 for a design.<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\"> “I was a SolidWorks guy,” he admits. “I was terrified to switch. It’s like jumping into the deep end of the pool.”</span></span> <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Once he started using it, though, he thought “Wow, this is incredible. It is really a magic show.”</span></span> In comparison to everything he had used before, it was “cleaner” and “snappier.” <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">As he puts it, “You don’t really wait on anything — it just happens.”</span></span>\r\nHe uses the example of designing the new bike’s headlight assembly using T-splines in Fusion 360.<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\"> In SolidWorks, he says, “I would probably need a solid day just to get the lofts going and the surfaces going.”</span></span> The process would have involved using three different features in SolidWorks to rotate, move, and scale the surface model, then laboriously exporting everything into Mastercam to prepare the design for manufacture.\r\nWith T-splines, by contrast, you just click and drag to alter position, shape, or size. <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“It’s like a digital version of clay,” Paul says.</span></span> <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">He laughs when he adds, “except when you’re pushing it around it doesn’t leave thumbprints.”</span></span>\r\nPaul has found that the integrated CAM is much easier in Fusion 360. <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“I use it every day now,” he says. “It’s a game changer for me. I just have more power to take a concept, model it up, and then take it to a CNC machine.”</span></span> He and the OCC machinist have also used Fusion 360 to export DXF files for use on their water jet machine to make some of the metal parts.\r\nThe very first thing Paul tackled in Fusion 360 was the entire body assembly for the electric bike. <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">He laughs at his own ambition when he adds, “I didn’t start off and make a kickstand, know what I mean?”</span></span>\r\nWanting to create a bike that would be totally different, he lit upon the idea of making the new design a true “fusion” in every sense. Unlike the long-forked choppers OCC usually makes, this bike is an urban“hopper” — lightweight and with lots of ground clearance. Using an electric motor allowed Paul to eliminate the exhaust system and V-twin engine of other OCC designs, which “opened up a whole new world of possibilities.\r\nIn line with the “fusion” idea, the bike incorporates components inspired by other types of vehicles: the aluminum front end of a sport bike, the gas shocks of a snowmobile, and the rear sprocket of a motocross racer, along with high-durability plastic elements and a few key parts in titanium.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“It was something new, fresh for us to do,” Pohl says, adding that every part of the new design came out of Fusion 360.</span></span>\r\nGiven the success of the project, Teutul wants the team to use Fusion 360 to design a new line of aftermarket parts for Harleys. <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Pohl describes Fusion 360 as “a new weapon in my arsenal here.”</span></span>","alias":"autodesk-fusion-360-for-orange-county-choppers","roi":0,"seo":{"title":"Autodesk Fusion 360 for Orange County Choppers","keywords":"","description":"Orange County Choppers (OCC), the focus of Discovery Channel’s long-running American Chopper, is known for its Easy Rider-style motorcycles — complete with loud V-twin gas engines. The design emerged from the mind of OCC designer Jason Pohl as he riffed on the","og:title":"Autodesk Fusion 360 for Orange County Choppers","og:description":"Orange County Choppers (OCC), the focus of Discovery Channel’s long-running American Chopper, is known for its Easy Rider-style motorcycles — complete with loud V-twin gas engines. The design emerged from the mind of OCC designer Jason Pohl as he riffed on the"},"deal_info":"","user":{"id":4464,"title":"Orange County Choppers (User)","logoURL":"https://old.roi4cio.com/uploads/roi/company/Orange_County_Choppers__logo_.png","alias":"orange-county-choppers-user","address":"","roles":[],"description":" Orange County Choppers (OCC) is a world famous custom motorcycle manufacturer founded in 1999 by Paul Teutul Sr. At our facility based in Newburgh, NY, Paul Sr. and his team of custom fabricators design, engineer and manufacture unique choppers. Orange County Choppers has been the center of the hit TV reality series “American Chopper”. American Chopper debuted in September 2002 on the Discovery Channel. We continue to entertain millions of people worldwide on a weekly basis. OCC bikes are customized and built around a theme or, increasingly, for a broad spectrum of motorcycle enthusiasts around the world.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://orangecountychoppers.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Orange County Choppers (User)","keywords":"","description":" Orange County Choppers (OCC) is a world famous custom motorcycle manufacturer founded in 1999 by Paul Teutul Sr. At our facility based in Newburgh, NY, Paul Sr. and his team of custom fabricators design, engineer and manufacture unique choppers. Orange County","og:title":"Orange County Choppers (User)","og:description":" Orange County Choppers (OCC) is a world famous custom motorcycle manufacturer founded in 1999 by Paul Teutul Sr. At our facility based in Newburgh, NY, Paul Sr. and his team of custom fabricators design, engineer and manufacture unique choppers. Orange County","og:image":"https://old.roi4cio.com/uploads/roi/company/Orange_County_Choppers__logo_.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":180,"title":"Autodesk","logoURL":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg","alias":"autodesk","address":"","roles":[],"description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a gallery of its customers' work in its San Francisco building. The company has offices worldwide, with U.S. locations in Northern California, Oregon, Colorado, Texas and in New England in New Hampshire and Massachusetts, and Canada locations in Ontario, Quebec, and Alberta.","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":33,"b4r":0,"categories":{},"companyUrl":"www.autodesk.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Autodesk","keywords":"Autodesk, California, software, locations, with, worldwide, building, company","description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:title":"Autodesk","og:description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:image":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg"},"eventUrl":""}],"products":[{"id":1012,"logo":false,"scheme":false,"title":"Autodesk Fusion 360","vendorVerified":0,"rating":"3.00","implementationsCount":6,"suppliersCount":0,"alias":"autodesk-fusion-360","companyTypes":[],"description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Quickly iterate on design ideas with sculpting tools to explore form and modeling tools to create finishing features.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Engineer & simulate </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Test fit and motion, perform simulations, create assemblies, make photorealistic renderings and animations.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> CAM </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Create toolpaths to machine your components or use the 3D printing workflow to create a prototype.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> Collaborate & manage </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Bring design teams together in a hybrid environment that harnesses the power of the cloud when necessary and uses local resources when it makes sense.</span></p>","shortDescription":"Fusion 360TM is the first 3D CAD, CAM, and CAE tool of its kind. It connects your entire product development process in a single cloud-based platform that works on both Mac and PC.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Autodesk Fusion 360","keywords":"create, design, when, tools, prototype, Collaborate, manage, teams","description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style","og:title":"Autodesk Fusion 360","og:description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style"},"eventUrl":"","translationId":1012,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":581,"title":"3D model Design","alias":"3d-model-design","description":" In 3D computer graphics, <span style=\"font-weight: bold; \">3D modeling</span> is the process of developing a mathematical representation of any surface of an object (either inanimate or living) in three dimensions via specialized software. The product is called a <span style=\"font-weight: bold; \">3D model.</span> Someone who works with 3D models may be referred to as a <span style=\"font-weight: bold; \">3D artist.</span> It can be displayed as a two-dimensional image through a process called 3D rendering or used in a computer simulation of physical phenomena. The model can also be physically created using 3D printing devices.\r\n3D modeling can be achieved manually with specialized 3D model design software, such as <span style=\"font-weight: bold; \">computer-aided design</span> (CAD) programs, that lets an artist create and deform polygonal surfaces or by scanning real-world objects into a set of data points that can be used to represent the object digitally.\r\nSoftware to create 3D models is a class of 3D computer graphics software used to produce 3D models. Individual programs of this class are called <span style=\"font-weight: bold; \">modeling applications</span> or <span style=\"font-weight: bold; \">modelers</span>.\r\nThree-dimensional (3D) models represent a physical body using a collection of points in 3D space, connected by various geometric entities such as triangles, lines, curved surfaces, etc. Being a collection of data (points and other information), 3D models can be created by hand, algorithmically (procedural modeling), or scanned. Their surfaces may be further defined with texture mapping.\r\nAlthough complex mathematical formulas are at the foundation of 3D drawing software, the programs automate computation for users and have tool-based user interfaces. 3D models are an output of 3D modeling and are based on a variety of digital representations. Boundary representation (B-rep) uses mathematically defined surfaces such as cones, spheres and NURBS (non-uniform rational basis spline) which are connected by topology to accurately represent objects as water-tight volumes. B-rep models are the preferred solution for engineering, and many 3D modeling applications for the design, simulation and manufacture of consumer and industrial products are B-rep based. \r\nVirtual 3D models can be turned into physical objects through 3D printing or traditional manufacturing processes. Models can also be converted into a static image through 3D rendering, commonly used to create photo-realistic representation for sales, marketing and eCommerce applications. 3D models can be created by the process of reverse engineering, in which 3D scanning technology is used to create digital replicas of real-world objects, including manufactured parts and assemblies, free-form models designed in clay and human anatomy. Modern 3d modeling and animation tools create and interact with a “digital twin”, which is used to develop, test, simulate and manufacture its real world counterpart as part of the product lifecycle.\r\n3D modeling is used in a wide range of fields, including engineering, architecture, entertainment, film, special effects, game development, and commercial advertising. It is an integral part of many creative careers. Engineers and architects use it to plan and design their work. Animators and game designers rely on 3D modeling tools to bring their ideas to life. And just about every Hollywood blockbuster uses 3D modeling for special effects, to cut costs, and to speed up production.\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Criteria to consider when choosing between 3D software programs</h1>\r\nThere is a wide range of 3D modeling and animation software addressing <span style=\"font-weight: bold; \">different fields of activity</span>. For instance, there is software dedicated to mechanical design, to engineering design, to civil engineering, to product design, to industrial design or to graphic design. The first thing to take into account is to select a design <span style=\"font-weight: bold; \">software targeted to your project</span>. Each field of activity has different needs. For example, a project about the creation of jewelry does not require the same 3D object software as a project of creation of aircraft models.\r\nAre you using a 3D drawing software for 3d printing, Laser Cutting or just for creating some digital art? Always take into account<span style=\"font-weight: bold; \"> the necessities of the technology</span> that you are designing for. Then, you can think: what is the <span style=\"font-weight: bold; \">budget</span> to select 3D modeling programs? If you afford to, you can pay for the required subscription. Alternatively, you can use the student license or the educational license that some design suites provide. Otherwise, there is various good quality 3D modeling app and software that is available for free and is equally good as professional options. In that case, you would like to get to know the software by downloading the limitied time and/or restricted functionality version that most vendors provide.\r\nChoose 3D design programs that are <span style=\"font-weight: bold; \">compatible with the Operating System</span> (OS) you are using, since not all the packages are meant to be used by all OS: Windows, Mac, Linux. Last but not least, choose a 3D modeling program according to your age and <span style=\"font-weight: bold; \">level of expertise.</span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_3D_model_Design.png"},{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":10,"title":"Ensure Compliance"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":346,"title":"Shortage of inhouse IT resources"}]}},"categories":[{"id":581,"title":"3D model Design","alias":"3d-model-design","description":" In 3D computer graphics, <span style=\"font-weight: bold; \">3D modeling</span> is the process of developing a mathematical representation of any surface of an object (either inanimate or living) in three dimensions via specialized software. The product is called a <span style=\"font-weight: bold; \">3D model.</span> Someone who works with 3D models may be referred to as a <span style=\"font-weight: bold; \">3D artist.</span> It can be displayed as a two-dimensional image through a process called 3D rendering or used in a computer simulation of physical phenomena. The model can also be physically created using 3D printing devices.\r\n3D modeling can be achieved manually with specialized 3D model design software, such as <span style=\"font-weight: bold; \">computer-aided design</span> (CAD) programs, that lets an artist create and deform polygonal surfaces or by scanning real-world objects into a set of data points that can be used to represent the object digitally.\r\nSoftware to create 3D models is a class of 3D computer graphics software used to produce 3D models. Individual programs of this class are called <span style=\"font-weight: bold; \">modeling applications</span> or <span style=\"font-weight: bold; \">modelers</span>.\r\nThree-dimensional (3D) models represent a physical body using a collection of points in 3D space, connected by various geometric entities such as triangles, lines, curved surfaces, etc. Being a collection of data (points and other information), 3D models can be created by hand, algorithmically (procedural modeling), or scanned. Their surfaces may be further defined with texture mapping.\r\nAlthough complex mathematical formulas are at the foundation of 3D drawing software, the programs automate computation for users and have tool-based user interfaces. 3D models are an output of 3D modeling and are based on a variety of digital representations. Boundary representation (B-rep) uses mathematically defined surfaces such as cones, spheres and NURBS (non-uniform rational basis spline) which are connected by topology to accurately represent objects as water-tight volumes. B-rep models are the preferred solution for engineering, and many 3D modeling applications for the design, simulation and manufacture of consumer and industrial products are B-rep based. \r\nVirtual 3D models can be turned into physical objects through 3D printing or traditional manufacturing processes. Models can also be converted into a static image through 3D rendering, commonly used to create photo-realistic representation for sales, marketing and eCommerce applications. 3D models can be created by the process of reverse engineering, in which 3D scanning technology is used to create digital replicas of real-world objects, including manufactured parts and assemblies, free-form models designed in clay and human anatomy. Modern 3d modeling and animation tools create and interact with a “digital twin”, which is used to develop, test, simulate and manufacture its real world counterpart as part of the product lifecycle.\r\n3D modeling is used in a wide range of fields, including engineering, architecture, entertainment, film, special effects, game development, and commercial advertising. It is an integral part of many creative careers. Engineers and architects use it to plan and design their work. Animators and game designers rely on 3D modeling tools to bring their ideas to life. And just about every Hollywood blockbuster uses 3D modeling for special effects, to cut costs, and to speed up production.\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Criteria to consider when choosing between 3D software programs</h1>\r\nThere is a wide range of 3D modeling and animation software addressing <span style=\"font-weight: bold; \">different fields of activity</span>. For instance, there is software dedicated to mechanical design, to engineering design, to civil engineering, to product design, to industrial design or to graphic design. The first thing to take into account is to select a design <span style=\"font-weight: bold; \">software targeted to your project</span>. Each field of activity has different needs. For example, a project about the creation of jewelry does not require the same 3D object software as a project of creation of aircraft models.\r\nAre you using a 3D drawing software for 3d printing, Laser Cutting or just for creating some digital art? Always take into account<span style=\"font-weight: bold; \"> the necessities of the technology</span> that you are designing for. Then, you can think: what is the <span style=\"font-weight: bold; \">budget</span> to select 3D modeling programs? If you afford to, you can pay for the required subscription. Alternatively, you can use the student license or the educational license that some design suites provide. Otherwise, there is various good quality 3D modeling app and software that is available for free and is equally good as professional options. In that case, you would like to get to know the software by downloading the limitied time and/or restricted functionality version that most vendors provide.\r\nChoose 3D design programs that are <span style=\"font-weight: bold; \">compatible with the Operating System</span> (OS) you are using, since not all the packages are meant to be used by all OS: Windows, Mac, Linux. Last but not least, choose a 3D modeling program according to your age and <span style=\"font-weight: bold; \">level of expertise.</span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_3D_model_Design.png"},{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.autodesk.com/products/fusion-360/blog/orange-county-choppers-electric-bike-fusion-360/","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":566,"title":"Autodesk Fusion 360 for Oru Kayak Company","description":"Here’s the problem: You want to hit the water in a kayak — but where are you going to store the thing when you’re not using it? And how are you going to transport such a long boat from home to the water?\r\nOru Kayak has solved that challenge with a line of tough, cleverly designed boats that fold up into a package the size of a small suitcase — one you can stow in the trunk of your car or sling over your shoulder. It’s all part of their vision “to make paddling more convenient, fun, and freeing for everyone.” Their focus has shifted from early-stage design toward the specific challenges of engineering and manufacturing. The point is to optimize both the user experience and the efficiency of production.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“It starts with design philosophy,” Willis says. “You have to be willing to make guesses, not get too attached to ideas, and change on a dime based on user feedback.”</span></span>\r\nFusion 360 has been integral to streamlining that process. “We began by using Fusion 360 to roughly model the kayak and parts, to visualize how pieces came together,” the company adds, “but we were still using CNC and other technologies to make the parts. Now, we’re revising many of thekayak parts with new injection molds” using Fusion 360.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“We are making the individual parts more efficient to manufacture, stronger, and more consistent with the overall aesthetic of the product — fluid, clean, and simple,”Willis says. “For combining these elements, it’s been crucial to have software that’s rigorous but allows for flexible and intuitive sculpting in three dimensions.”</span></span>\r\nThe level of detail required can seem exhausting, but the company believes the payoff is worth it.","alias":"autodesk-fusion-360-for-oru-kayak-company","roi":0,"seo":{"title":"Autodesk Fusion 360 for Oru Kayak Company","keywords":"","description":"Here’s the problem: You want to hit the water in a kayak — but where are you going to store the thing when you’re not using it? And how are you going to transport such a long boat from home to the water?\r\nOru Kayak has solved that challenge with a line of toug","og:title":"Autodesk Fusion 360 for Oru Kayak Company","og:description":"Here’s the problem: You want to hit the water in a kayak — but where are you going to store the thing when you’re not using it? And how are you going to transport such a long boat from home to the water?\r\nOru Kayak has solved that challenge with a line of toug"},"deal_info":"","user":{"id":4465,"title":"Oru Kayak (User)","logoURL":"https://old.roi4cio.com/uploads/roi/company/Oru_Kayak__logo_.png","alias":"oru-kayak-user","address":"","roles":[],"description":" Oru Kayak is a San Francisco based startup that manufactures high-performance, folding kayaks.\r\nAn award-winning company on a mission to make the outdoors more accessible by designing a series of origami folding kayaks that transform from a portable box, into a sleek lightweight, and high-performance watercraft. folding kayaks inspired by origami has won multiple designs and industry awards including ISPO's Product of the Year and Gold winner of Edison awards — it’s even in the San Francisco Museum of Modern Art.\r\nOru Kayak is a team of makers, designers, business strategists, and outdoors lovers.\r\nSource: https://www.linkedin.com/company/oru-kayak/?originalSubdomain=en","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.orukayak.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Oru Kayak (User)","keywords":"","description":" Oru Kayak is a San Francisco based startup that manufactures high-performance, folding kayaks.\r\nAn award-winning company on a mission to make the outdoors more accessible by designing a series of origami folding kayaks that transform from a portable box, into","og:title":"Oru Kayak (User)","og:description":" Oru Kayak is a San Francisco based startup that manufactures high-performance, folding kayaks.\r\nAn award-winning company on a mission to make the outdoors more accessible by designing a series of origami folding kayaks that transform from a portable box, into","og:image":"https://old.roi4cio.com/uploads/roi/company/Oru_Kayak__logo_.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":180,"title":"Autodesk","logoURL":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg","alias":"autodesk","address":"","roles":[],"description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a gallery of its customers' work in its San Francisco building. The company has offices worldwide, with U.S. locations in Northern California, Oregon, Colorado, Texas and in New England in New Hampshire and Massachusetts, and Canada locations in Ontario, Quebec, and Alberta.","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":33,"b4r":0,"categories":{},"companyUrl":"www.autodesk.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Autodesk","keywords":"Autodesk, California, software, locations, with, worldwide, building, company","description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:title":"Autodesk","og:description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:image":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg"},"eventUrl":""}],"products":[{"id":1012,"logo":false,"scheme":false,"title":"Autodesk Fusion 360","vendorVerified":0,"rating":"3.00","implementationsCount":6,"suppliersCount":0,"alias":"autodesk-fusion-360","companyTypes":[],"description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Quickly iterate on design ideas with sculpting tools to explore form and modeling tools to create finishing features.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Engineer & simulate </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Test fit and motion, perform simulations, create assemblies, make photorealistic renderings and animations.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> CAM </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Create toolpaths to machine your components or use the 3D printing workflow to create a prototype.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> Collaborate & manage </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Bring design teams together in a hybrid environment that harnesses the power of the cloud when necessary and uses local resources when it makes sense.</span></p>","shortDescription":"Fusion 360TM is the first 3D CAD, CAM, and CAE tool of its kind. It connects your entire product development process in a single cloud-based platform that works on both Mac and PC.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Autodesk Fusion 360","keywords":"create, design, when, tools, prototype, Collaborate, manage, teams","description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style","og:title":"Autodesk Fusion 360","og:description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style"},"eventUrl":"","translationId":1012,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":581,"title":"3D model Design","alias":"3d-model-design","description":" In 3D computer graphics, <span style=\"font-weight: bold; \">3D modeling</span> is the process of developing a mathematical representation of any surface of an object (either inanimate or living) in three dimensions via specialized software. The product is called a <span style=\"font-weight: bold; \">3D model.</span> Someone who works with 3D models may be referred to as a <span style=\"font-weight: bold; \">3D artist.</span> It can be displayed as a two-dimensional image through a process called 3D rendering or used in a computer simulation of physical phenomena. The model can also be physically created using 3D printing devices.\r\n3D modeling can be achieved manually with specialized 3D model design software, such as <span style=\"font-weight: bold; \">computer-aided design</span> (CAD) programs, that lets an artist create and deform polygonal surfaces or by scanning real-world objects into a set of data points that can be used to represent the object digitally.\r\nSoftware to create 3D models is a class of 3D computer graphics software used to produce 3D models. Individual programs of this class are called <span style=\"font-weight: bold; \">modeling applications</span> or <span style=\"font-weight: bold; \">modelers</span>.\r\nThree-dimensional (3D) models represent a physical body using a collection of points in 3D space, connected by various geometric entities such as triangles, lines, curved surfaces, etc. Being a collection of data (points and other information), 3D models can be created by hand, algorithmically (procedural modeling), or scanned. Their surfaces may be further defined with texture mapping.\r\nAlthough complex mathematical formulas are at the foundation of 3D drawing software, the programs automate computation for users and have tool-based user interfaces. 3D models are an output of 3D modeling and are based on a variety of digital representations. Boundary representation (B-rep) uses mathematically defined surfaces such as cones, spheres and NURBS (non-uniform rational basis spline) which are connected by topology to accurately represent objects as water-tight volumes. B-rep models are the preferred solution for engineering, and many 3D modeling applications for the design, simulation and manufacture of consumer and industrial products are B-rep based. \r\nVirtual 3D models can be turned into physical objects through 3D printing or traditional manufacturing processes. Models can also be converted into a static image through 3D rendering, commonly used to create photo-realistic representation for sales, marketing and eCommerce applications. 3D models can be created by the process of reverse engineering, in which 3D scanning technology is used to create digital replicas of real-world objects, including manufactured parts and assemblies, free-form models designed in clay and human anatomy. Modern 3d modeling and animation tools create and interact with a “digital twin”, which is used to develop, test, simulate and manufacture its real world counterpart as part of the product lifecycle.\r\n3D modeling is used in a wide range of fields, including engineering, architecture, entertainment, film, special effects, game development, and commercial advertising. It is an integral part of many creative careers. Engineers and architects use it to plan and design their work. Animators and game designers rely on 3D modeling tools to bring their ideas to life. And just about every Hollywood blockbuster uses 3D modeling for special effects, to cut costs, and to speed up production.\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Criteria to consider when choosing between 3D software programs</h1>\r\nThere is a wide range of 3D modeling and animation software addressing <span style=\"font-weight: bold; \">different fields of activity</span>. For instance, there is software dedicated to mechanical design, to engineering design, to civil engineering, to product design, to industrial design or to graphic design. The first thing to take into account is to select a design <span style=\"font-weight: bold; \">software targeted to your project</span>. Each field of activity has different needs. For example, a project about the creation of jewelry does not require the same 3D object software as a project of creation of aircraft models.\r\nAre you using a 3D drawing software for 3d printing, Laser Cutting or just for creating some digital art? Always take into account<span style=\"font-weight: bold; \"> the necessities of the technology</span> that you are designing for. Then, you can think: what is the <span style=\"font-weight: bold; \">budget</span> to select 3D modeling programs? If you afford to, you can pay for the required subscription. Alternatively, you can use the student license or the educational license that some design suites provide. Otherwise, there is various good quality 3D modeling app and software that is available for free and is equally good as professional options. In that case, you would like to get to know the software by downloading the limitied time and/or restricted functionality version that most vendors provide.\r\nChoose 3D design programs that are <span style=\"font-weight: bold; \">compatible with the Operating System</span> (OS) you are using, since not all the packages are meant to be used by all OS: Windows, Mac, Linux. Last but not least, choose a 3D modeling program according to your age and <span style=\"font-weight: bold; \">level of expertise.</span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_3D_model_Design.png"},{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":10,"title":"Ensure Compliance"},{"id":252,"title":"Increase Customer Base"},{"id":307,"title":"Enhance Competitive Ability"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":400,"title":"High costs"},{"id":401,"title":"No control over implementation"}]}},"categories":[{"id":581,"title":"3D model Design","alias":"3d-model-design","description":" In 3D computer graphics, <span style=\"font-weight: bold; \">3D modeling</span> is the process of developing a mathematical representation of any surface of an object (either inanimate or living) in three dimensions via specialized software. The product is called a <span style=\"font-weight: bold; \">3D model.</span> Someone who works with 3D models may be referred to as a <span style=\"font-weight: bold; \">3D artist.</span> It can be displayed as a two-dimensional image through a process called 3D rendering or used in a computer simulation of physical phenomena. The model can also be physically created using 3D printing devices.\r\n3D modeling can be achieved manually with specialized 3D model design software, such as <span style=\"font-weight: bold; \">computer-aided design</span> (CAD) programs, that lets an artist create and deform polygonal surfaces or by scanning real-world objects into a set of data points that can be used to represent the object digitally.\r\nSoftware to create 3D models is a class of 3D computer graphics software used to produce 3D models. Individual programs of this class are called <span style=\"font-weight: bold; \">modeling applications</span> or <span style=\"font-weight: bold; \">modelers</span>.\r\nThree-dimensional (3D) models represent a physical body using a collection of points in 3D space, connected by various geometric entities such as triangles, lines, curved surfaces, etc. Being a collection of data (points and other information), 3D models can be created by hand, algorithmically (procedural modeling), or scanned. Their surfaces may be further defined with texture mapping.\r\nAlthough complex mathematical formulas are at the foundation of 3D drawing software, the programs automate computation for users and have tool-based user interfaces. 3D models are an output of 3D modeling and are based on a variety of digital representations. Boundary representation (B-rep) uses mathematically defined surfaces such as cones, spheres and NURBS (non-uniform rational basis spline) which are connected by topology to accurately represent objects as water-tight volumes. B-rep models are the preferred solution for engineering, and many 3D modeling applications for the design, simulation and manufacture of consumer and industrial products are B-rep based. \r\nVirtual 3D models can be turned into physical objects through 3D printing or traditional manufacturing processes. Models can also be converted into a static image through 3D rendering, commonly used to create photo-realistic representation for sales, marketing and eCommerce applications. 3D models can be created by the process of reverse engineering, in which 3D scanning technology is used to create digital replicas of real-world objects, including manufactured parts and assemblies, free-form models designed in clay and human anatomy. Modern 3d modeling and animation tools create and interact with a “digital twin”, which is used to develop, test, simulate and manufacture its real world counterpart as part of the product lifecycle.\r\n3D modeling is used in a wide range of fields, including engineering, architecture, entertainment, film, special effects, game development, and commercial advertising. It is an integral part of many creative careers. Engineers and architects use it to plan and design their work. Animators and game designers rely on 3D modeling tools to bring their ideas to life. And just about every Hollywood blockbuster uses 3D modeling for special effects, to cut costs, and to speed up production.\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Criteria to consider when choosing between 3D software programs</h1>\r\nThere is a wide range of 3D modeling and animation software addressing <span style=\"font-weight: bold; \">different fields of activity</span>. For instance, there is software dedicated to mechanical design, to engineering design, to civil engineering, to product design, to industrial design or to graphic design. The first thing to take into account is to select a design <span style=\"font-weight: bold; \">software targeted to your project</span>. Each field of activity has different needs. For example, a project about the creation of jewelry does not require the same 3D object software as a project of creation of aircraft models.\r\nAre you using a 3D drawing software for 3d printing, Laser Cutting or just for creating some digital art? Always take into account<span style=\"font-weight: bold; \"> the necessities of the technology</span> that you are designing for. Then, you can think: what is the <span style=\"font-weight: bold; \">budget</span> to select 3D modeling programs? If you afford to, you can pay for the required subscription. Alternatively, you can use the student license or the educational license that some design suites provide. Otherwise, there is various good quality 3D modeling app and software that is available for free and is equally good as professional options. In that case, you would like to get to know the software by downloading the limitied time and/or restricted functionality version that most vendors provide.\r\nChoose 3D design programs that are <span style=\"font-weight: bold; \">compatible with the Operating System</span> (OS) you are using, since not all the packages are meant to be used by all OS: Windows, Mac, Linux. Last but not least, choose a 3D modeling program according to your age and <span style=\"font-weight: bold; \">level of expertise.</span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_3D_model_Design.png"},{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.autodesk.com/products/fusion-360/blog/oru-kayak-design-get-people-paddling/","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":570,"title":"Autodesk Fusion 360 for putter manufacturer SandFlo Golf","description":"In the town of Trollhättan in southwestern Sweden, engineer Johan Sandflo spends his days managing his precision machining business. At night, he perfects designs for SandFlo Golf‘s custom putters. He’s come to rely on Fusion 360 to help him follow both of those passions.\r\nSandflo started using Fusion 360 in the shop late in 2014 after he stumbled across it on YouTube. Once he downloaded a trial version, it didn’t take him long to get hooked, especially considering the responsiveness of the Autodesk team and user community online. <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“I tried it for a few weeks,” he says, “and haven’t looked back.”</span></span>\r\nIn the job shop, CAM reigns supreme, especially for setting toolpaths. Sandflo particularly likes Fusion 360’s “awesome” adaptive clearing functionality for roughing out machined parts. In the past he’s used about ten different CAM applications, most recently a combination of Mastercam and OneCNC, but found that none of them worked as well: <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“Nothing compares to Fusion 360 for the kind of jobs that I do.”</span></span>\r\nWhen getting started with Fusion 360, Sandflo explains,<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\"> “I went down the CAM side first,then kind of discovered the CAD side.”</span></span> The CAD features make it simple for him to streamline his machining work, for example by taking a customer drawing and turning it into a proper CAD model.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Sandflo says he believes that “I have an advantage over other companies my size when I use Fusion 360.”</span></span> In part that comes from the software’s functionality and cloud-based approach. But he also says that the thinking and interactions around the software are a refreshing departure from the rigid enterprise model that typically prevails.<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\"> “It’s a modern take on it,” he says. “It’s not like anything else in the industry.”</span></span>\r\nAnd then there are the costs. Not only is Fusion 360 much cheaper than comparable programs, but you don’t have to pay extra for training. <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“It’s amazingly affordable,” Sandflo says, adding, “Why would you use something that’s ten or twenty times more expensive?</span></span> I can invest that money elsewhere to make the business grow.”\r\nEven better, the software has allowed Sandflo to extend his passion for golf. <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">It makes him happy “to get a few hours in with friends, have a good laugh,” he says.</span></span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“Being a golf nerd,” he adds, “it’s always fun [tinkering] with equipment.” He began to look online for clubs that were “exotic, more personalized,” and then realized he could make his own. As he puts it, “I have the knowledge to do something like this myself. I have the machines. Why not start modeling something, see what happens?”</span></span>\r\nBefore he discovered Fusion 360, it was slow going. He didn’t have enough CAD skills to do what he wanted to, and found the combination of SolidWorks and Mastercam unwieldy. Then everything changed. <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“When I found Fusion 360, that was the turning point,” he says.</span></span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“To make the changes — the small iterations, the small tweaks — it is so easy,” he adds. Fusion 360’s cloud-based approach is especially useful for him because it lets him squeeze in design work whenever he has time. “For me as a small business owner,” he says, “the ability to work at home at night when the kids are asleep is second to none. It’s so easy and convenient, and you have all the files available at a mouse click. . . . When I get to work the next day, it’s all done. So I can keep the machines turning.”</span></span>\r\nUsing Fusion 360, he’s able to share putter designs with customers via a simple URL. Even if they’ve never used the software, it’s easy for the customer to view and rotate a 3D model of the latest design in any browser. <span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">“My customers have enjoyed that very much,” he says.</span></span>","alias":"autodesk-fusion-360-for-putter-manufacturer-sandflo-golf","roi":0,"seo":{"title":"Autodesk Fusion 360 for putter manufacturer SandFlo Golf","keywords":"","description":"In the town of Trollhättan in southwestern Sweden, engineer Johan Sandflo spends his days managing his precision machining business. At night, he perfects designs for SandFlo Golf‘s custom putters. He’s come to rely on Fusion 360 to help him follow both of tho","og:title":"Autodesk Fusion 360 for putter manufacturer SandFlo Golf","og:description":"In the town of Trollhättan in southwestern Sweden, engineer Johan Sandflo spends his days managing his precision machining business. At night, he perfects designs for SandFlo Golf‘s custom putters. He’s come to rely on Fusion 360 to help him follow both of tho"},"deal_info":"","user":{"id":4467,"title":"SandFlo Golf (User)","logoURL":"https://old.roi4cio.com/uploads/roi/company/SandFlo_Golf__logo_.png","alias":"sandflo-golf-user","address":"","roles":[],"description":" Our profession is our passion and we love what we do. In 2014 an idea was born to tailor premium putters of thehighest quality and precision to golf enthusiast; and Sandflo Golf Co. saw first light. Today we can proudly say that we are the only company in Sweden who manufacture custom-made putters that meet customer wishes and requirements.\r\nIn close dialogue with the customer, the process can be monitored from sketch to finished product. Each putter is unique and the client has the opportunity to select materials, design, weight distribution and pattern. Some customers have a clear picture of what design and engraving their putter should have. The result is a unique putter that is fully designed according to the customer’s wishes. Once the design is in place, a 3D sketch is made, which is then sent to the customer for a final assessment and the production can start.\r\nSource: http://www.sandflogolf.com/en/","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":1,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.sandflogolf.com/en/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SandFlo Golf (User)","keywords":"","description":" Our profession is our passion and we love what we do. In 2014 an idea was born to tailor premium putters of thehighest quality and precision to golf enthusiast; and Sandflo Golf Co. saw first light. Today we can proudly say that we are the only company in Swe","og:title":"SandFlo Golf (User)","og:description":" Our profession is our passion and we love what we do. In 2014 an idea was born to tailor premium putters of thehighest quality and precision to golf enthusiast; and Sandflo Golf Co. saw first light. Today we can proudly say that we are the only company in Swe","og:image":"https://old.roi4cio.com/uploads/roi/company/SandFlo_Golf__logo_.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":180,"title":"Autodesk","logoURL":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg","alias":"autodesk","address":"","roles":[],"description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a gallery of its customers' work in its San Francisco building. The company has offices worldwide, with U.S. locations in Northern California, Oregon, Colorado, Texas and in New England in New Hampshire and Massachusetts, and Canada locations in Ontario, Quebec, and Alberta.","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":33,"b4r":0,"categories":{},"companyUrl":"www.autodesk.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Autodesk","keywords":"Autodesk, California, software, locations, with, worldwide, building, company","description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:title":"Autodesk","og:description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:image":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg"},"eventUrl":""}],"products":[{"id":1012,"logo":false,"scheme":false,"title":"Autodesk Fusion 360","vendorVerified":0,"rating":"3.00","implementationsCount":6,"suppliersCount":0,"alias":"autodesk-fusion-360","companyTypes":[],"description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Quickly iterate on design ideas with sculpting tools to explore form and modeling tools to create finishing features.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Engineer & simulate </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Test fit and motion, perform simulations, create assemblies, make photorealistic renderings and animations.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> CAM </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Create toolpaths to machine your components or use the 3D printing workflow to create a prototype.</span><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \"> Collaborate & manage </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; white-space: pre-wrap;\">Bring design teams together in a hybrid environment that harnesses the power of the cloud when necessary and uses local resources when it makes sense.</span></p>","shortDescription":"Fusion 360TM is the first 3D CAD, CAM, and CAE tool of its kind. It connects your entire product development process in a single cloud-based platform that works on both Mac and PC.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Autodesk Fusion 360","keywords":"create, design, when, tools, prototype, Collaborate, manage, teams","description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style","og:title":"Autodesk Fusion 360","og:description":"<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style=\"font-family: Verdana; font-weight: bold; white-space: pre-wrap; \">Design </span></p>\r\n<p dir=\"ltr\" style=\"line-height:1.38; margin-top:0pt; margin-bottom:0pt; \"><span style"},"eventUrl":"","translationId":1012,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":581,"title":"3D model Design","alias":"3d-model-design","description":" In 3D computer graphics, <span style=\"font-weight: bold; \">3D modeling</span> is the process of developing a mathematical representation of any surface of an object (either inanimate or living) in three dimensions via specialized software. The product is called a <span style=\"font-weight: bold; \">3D model.</span> Someone who works with 3D models may be referred to as a <span style=\"font-weight: bold; \">3D artist.</span> It can be displayed as a two-dimensional image through a process called 3D rendering or used in a computer simulation of physical phenomena. The model can also be physically created using 3D printing devices.\r\n3D modeling can be achieved manually with specialized 3D model design software, such as <span style=\"font-weight: bold; \">computer-aided design</span> (CAD) programs, that lets an artist create and deform polygonal surfaces or by scanning real-world objects into a set of data points that can be used to represent the object digitally.\r\nSoftware to create 3D models is a class of 3D computer graphics software used to produce 3D models. Individual programs of this class are called <span style=\"font-weight: bold; \">modeling applications</span> or <span style=\"font-weight: bold; \">modelers</span>.\r\nThree-dimensional (3D) models represent a physical body using a collection of points in 3D space, connected by various geometric entities such as triangles, lines, curved surfaces, etc. Being a collection of data (points and other information), 3D models can be created by hand, algorithmically (procedural modeling), or scanned. Their surfaces may be further defined with texture mapping.\r\nAlthough complex mathematical formulas are at the foundation of 3D drawing software, the programs automate computation for users and have tool-based user interfaces. 3D models are an output of 3D modeling and are based on a variety of digital representations. Boundary representation (B-rep) uses mathematically defined surfaces such as cones, spheres and NURBS (non-uniform rational basis spline) which are connected by topology to accurately represent objects as water-tight volumes. B-rep models are the preferred solution for engineering, and many 3D modeling applications for the design, simulation and manufacture of consumer and industrial products are B-rep based. \r\nVirtual 3D models can be turned into physical objects through 3D printing or traditional manufacturing processes. Models can also be converted into a static image through 3D rendering, commonly used to create photo-realistic representation for sales, marketing and eCommerce applications. 3D models can be created by the process of reverse engineering, in which 3D scanning technology is used to create digital replicas of real-world objects, including manufactured parts and assemblies, free-form models designed in clay and human anatomy. Modern 3d modeling and animation tools create and interact with a “digital twin”, which is used to develop, test, simulate and manufacture its real world counterpart as part of the product lifecycle.\r\n3D modeling is used in a wide range of fields, including engineering, architecture, entertainment, film, special effects, game development, and commercial advertising. It is an integral part of many creative careers. Engineers and architects use it to plan and design their work. Animators and game designers rely on 3D modeling tools to bring their ideas to life. And just about every Hollywood blockbuster uses 3D modeling for special effects, to cut costs, and to speed up production.\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Criteria to consider when choosing between 3D software programs</h1>\r\nThere is a wide range of 3D modeling and animation software addressing <span style=\"font-weight: bold; \">different fields of activity</span>. For instance, there is software dedicated to mechanical design, to engineering design, to civil engineering, to product design, to industrial design or to graphic design. The first thing to take into account is to select a design <span style=\"font-weight: bold; \">software targeted to your project</span>. Each field of activity has different needs. For example, a project about the creation of jewelry does not require the same 3D object software as a project of creation of aircraft models.\r\nAre you using a 3D drawing software for 3d printing, Laser Cutting or just for creating some digital art? Always take into account<span style=\"font-weight: bold; \"> the necessities of the technology</span> that you are designing for. Then, you can think: what is the <span style=\"font-weight: bold; \">budget</span> to select 3D modeling programs? If you afford to, you can pay for the required subscription. Alternatively, you can use the student license or the educational license that some design suites provide. Otherwise, there is various good quality 3D modeling app and software that is available for free and is equally good as professional options. In that case, you would like to get to know the software by downloading the limitied time and/or restricted functionality version that most vendors provide.\r\nChoose 3D design programs that are <span style=\"font-weight: bold; \">compatible with the Operating System</span> (OS) you are using, since not all the packages are meant to be used by all OS: Windows, Mac, Linux. Last but not least, choose a 3D modeling program according to your age and <span style=\"font-weight: bold; \">level of expertise.</span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_3D_model_Design.png"},{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":10,"title":"Ensure Compliance"},{"id":307,"title":"Enhance Competitive Ability"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":400,"title":"High costs"},{"id":401,"title":"No control over implementation"}]}},"categories":[{"id":581,"title":"3D model Design","alias":"3d-model-design","description":" In 3D computer graphics, <span style=\"font-weight: bold; \">3D modeling</span> is the process of developing a mathematical representation of any surface of an object (either inanimate or living) in three dimensions via specialized software. The product is called a <span style=\"font-weight: bold; \">3D model.</span> Someone who works with 3D models may be referred to as a <span style=\"font-weight: bold; \">3D artist.</span> It can be displayed as a two-dimensional image through a process called 3D rendering or used in a computer simulation of physical phenomena. The model can also be physically created using 3D printing devices.\r\n3D modeling can be achieved manually with specialized 3D model design software, such as <span style=\"font-weight: bold; \">computer-aided design</span> (CAD) programs, that lets an artist create and deform polygonal surfaces or by scanning real-world objects into a set of data points that can be used to represent the object digitally.\r\nSoftware to create 3D models is a class of 3D computer graphics software used to produce 3D models. Individual programs of this class are called <span style=\"font-weight: bold; \">modeling applications</span> or <span style=\"font-weight: bold; \">modelers</span>.\r\nThree-dimensional (3D) models represent a physical body using a collection of points in 3D space, connected by various geometric entities such as triangles, lines, curved surfaces, etc. Being a collection of data (points and other information), 3D models can be created by hand, algorithmically (procedural modeling), or scanned. Their surfaces may be further defined with texture mapping.\r\nAlthough complex mathematical formulas are at the foundation of 3D drawing software, the programs automate computation for users and have tool-based user interfaces. 3D models are an output of 3D modeling and are based on a variety of digital representations. Boundary representation (B-rep) uses mathematically defined surfaces such as cones, spheres and NURBS (non-uniform rational basis spline) which are connected by topology to accurately represent objects as water-tight volumes. B-rep models are the preferred solution for engineering, and many 3D modeling applications for the design, simulation and manufacture of consumer and industrial products are B-rep based. \r\nVirtual 3D models can be turned into physical objects through 3D printing or traditional manufacturing processes. Models can also be converted into a static image through 3D rendering, commonly used to create photo-realistic representation for sales, marketing and eCommerce applications. 3D models can be created by the process of reverse engineering, in which 3D scanning technology is used to create digital replicas of real-world objects, including manufactured parts and assemblies, free-form models designed in clay and human anatomy. Modern 3d modeling and animation tools create and interact with a “digital twin”, which is used to develop, test, simulate and manufacture its real world counterpart as part of the product lifecycle.\r\n3D modeling is used in a wide range of fields, including engineering, architecture, entertainment, film, special effects, game development, and commercial advertising. It is an integral part of many creative careers. Engineers and architects use it to plan and design their work. Animators and game designers rely on 3D modeling tools to bring their ideas to life. And just about every Hollywood blockbuster uses 3D modeling for special effects, to cut costs, and to speed up production.\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Criteria to consider when choosing between 3D software programs</h1>\r\nThere is a wide range of 3D modeling and animation software addressing <span style=\"font-weight: bold; \">different fields of activity</span>. For instance, there is software dedicated to mechanical design, to engineering design, to civil engineering, to product design, to industrial design or to graphic design. The first thing to take into account is to select a design <span style=\"font-weight: bold; \">software targeted to your project</span>. Each field of activity has different needs. For example, a project about the creation of jewelry does not require the same 3D object software as a project of creation of aircraft models.\r\nAre you using a 3D drawing software for 3d printing, Laser Cutting or just for creating some digital art? Always take into account<span style=\"font-weight: bold; \"> the necessities of the technology</span> that you are designing for. Then, you can think: what is the <span style=\"font-weight: bold; \">budget</span> to select 3D modeling programs? If you afford to, you can pay for the required subscription. Alternatively, you can use the student license or the educational license that some design suites provide. Otherwise, there is various good quality 3D modeling app and software that is available for free and is equally good as professional options. In that case, you would like to get to know the software by downloading the limitied time and/or restricted functionality version that most vendors provide.\r\nChoose 3D design programs that are <span style=\"font-weight: bold; \">compatible with the Operating System</span> (OS) you are using, since not all the packages are meant to be used by all OS: Windows, Mac, Linux. Last but not least, choose a 3D modeling program according to your age and <span style=\"font-weight: bold; \">level of expertise.</span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_3D_model_Design.png"},{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.autodesk.com/products/fusion-360/blog/johan-sandflo-unites-loves-golf-machining-using-fusion-360/","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":492,"title":"Autodesk® Revit®, AutoCAD® for the largest skyscraper in China","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Project summary</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">A striking new addition to the Shanghai skyline is currently rising in the heart of the city’s financial district. The super high-rise Shanghai Tower will soon stand as the world’s second tallest building, and adjacent to two other iconic structures, the Jin Mao Tower and the Shanghai World Financial Center. The 121-story transparent glass tower will twist and taper as it rises, conveying a unique feeling of movement and growth, while reflecting the reemergence of Shanghai’s economic and</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">cultural influences amid the rise of an increasingly modern China. The massive mixed-use facility will include commercial and retail space; entertainment and cultural venues; a conference center; a luxury hotel; and public gardens, all evoking the sense of a self-contained city within Shanghai.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Once complete, the 632-meter Shanghai Tower will be the largest skyscraper in China as well as one of the most sustainable. The towering skyscraper comprises nine cylindrical buildings stacked on top of one another, all enclosed by a circular inner curtain wall and a triangular facade enveloping the entire structure. Each vertical neighborhood has its own atrium, featuring a public sky garden, together with cafes, restaurants, and retail space. The double-skinned facade creates a thermal buffer zone to minimize heat gain, and the spiraling nature of the outer facade maximizes daylighting and views while reducing wind loads and conserving construction materials. To save energy, the facility includes its own wind farm and geothermal system. In addition, rainwater recovery and gray water recycling systems reduce water usage. The owner and design team are targeting a LEED® Gold rating and a China 3 Star rating, ambitious goals for a project the size of the Shanghai Tower.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The challenge</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The sheer size of the Shanghai Tower presents complex design and construction management challenges. “The Shanghai Tower is a massive project with over 575,000 square meters of building space,” says Jianping Gu, director and general manager for Shanghai Tower Construction & Development Co., Ltd., the tower’s owner/ developer. “We knew that if we tried to work in a traditional way, using traditional tools and delivery systems, it would be extremely difficult to carry out this project successfully.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Reducing building materials by 32 percent.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The project involves the collaboration of a global team, including:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Shanghai Tower Construction & Development— owner/developer</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Gensler—design architect</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Architectural Design and Research Institute of Tongji University—local design institute</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Thornton Tomasetti—structural engineer</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Cosentini Associates—MEP engineer</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Shanghai Construction Group—general contractor</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Shanghai Installation Engineering—mechanical and electrical general contractor</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Shanghai Xiandai Engineering Consultants— design management consultant</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Autodesk Consulting—BIM strategy, training, and implementation consultant</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“Because Shanghai Tower is such a complex building, it could not be represented accurately with typical software or design methods,” says Jiliang Chen, deputy chief architect and deputy director of the project operations department at the Architectural Design and Research Institute of Tongji University. “One of the most challenging issues is the coordination of the extended design team,” adds Yi Zhu, senior principal and general manager at Thornton Tomasetti.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The solution</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">To help meet the ambitious goals set for the building, the Shanghai Tower owner required the implementation of a Building Information Modeling (BIM) process using Autodesk BIM solutions for the design and construction of the Shanghai Tower. The project team relies on a combination of Autodesk® Revit® Architecture, Autodesk® Revit® Structure, and Autodesk® Revit® MEP software for the tower’s design and documentation. The team is also using Autodesk® Navisworks® Manage software for coordination and collaboration, Autodesk® Ecotect® Analysis software for sustainable design analysis, and traditional AutoCAD® software for drawing production. “From a property owner’s perspective, BIM provides an excellent tool for the design, construction, management, and investment control of the entire project,” says Gu.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Transforming work processes</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Early on, the owner engaged Autodesk Consulting to provide BIM strategy and implementation consulting services, as well as application training. Autodesk Consulting began its effort by helping the owner develop a BIM strategy and deployment plan for the project, and retooling design and construction workflows to support BIM-based processes. The team created detailed plans for project collaboration and document management, as well as defining the BIM deliverables for the entire project lifecycle.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Autodesk Consulting also helped the owner implement an on-site BIM application environment for a local project team of over 50 members, including owner personnel and key project participants from the extended global project team. In addition, Autodesk Consulting provided software training and ongoing technical and BIM coaching support.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“By combining Autodesk’s BIM technology and the deep expertise of Autodesk Consulting, we have been able to successfully transition to BIM much faster. As a result, this project has set new standards for the information management of construction projects in China,” says Gu.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Integrating the design</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The extended architectural and structural teams—with designers in offices around the world—shared their design models, enabling them to collaborate and contribute insights about the design in the context of the project.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">In the construction phase, the local project team, working from temporary offices near the construction site, routinely shared its models for project coordination and collaboration. This communication of design data resulted in a natural coordination of the project as it unfolded. In addition, the team used both Revit and Navisworks Manage software for formal clash detection.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“We used Revit Architecture software to design and model the tower and then shared those models with our mechanical, electrical, and structural consultants,” explains Michael Peng, associate senior designer at Gensler. “Autodesk Revit provided a common platform for our design partners, giving the team a more accurate representation and deeper understanding of the project,” adds Jun Xia, principal and regional design director at Gensler. “BIM accelerated our whole design process, enabling our engineers to access design data and geometric sizes directly from the building models, and to use that</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">information for calculation and analysis,” says Zhu.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Improving design communication</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The tower’s iconic twisting shape and dualskinned facade were extremely difficult to convey using traditional 2D approaches, making modelbased design vital for the project’s success. “BIM helped us visualize the tower in 3D and analyze the design for improved decision making,” says Xia. “For example, we used the Revit design model with the reflection analysis features of Ecotect software to analyze the glare from the tower throughout the city. This helped the design team optimize the outer curtain wall—even down to the position and angle of individual pieces of glass—to minimize</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">light pollution.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">“During design, BIM was indispensable for coordinating the major design disciplines and producing construction documentation,” reports Chen. Model-based visualizations will also aid in the construction process. “By visualizing a 3D virtual building, we can better monitor construction and gauge our progress against the schedule,” says Xiaoming Yu, deputy chief engineer and design supervision department manager for Shanghai Installation Engineering.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">“In fact, we require BIM deliverables from all the subcontractors and equipment suppliers. And during construction, it will be much easier for the workers to understand construction drawings that contain a combination of traditional views such as plans and sections, as well as 3D views and visualizations of complicated areas.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Enhancing coordination</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The project team used the Revit platform for early coordination of the major design disciplines. In the construction phase, the team is combining the Revit design models and the fabrication models in Navisworks for whole project coordination.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">“As construction proceeds, BIM is helping us coordinate the subcontractors’ fabrication models, leading to a better quality design and the avoidance of rework costs,” says Chen.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-style: italic;\">“For example, the tower’s basement has already been built, and comprises five stories and 170,000 square meters of space,” says Gu. “During design development, we found only seven clashes. During construction, there were no clashes at all. It would be very difficult if not impossible to get results like that without BIM.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Conserving more energy</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">A central and attractive feature of the tower’s design is its transparent skin, which creates ventilated atriums that naturally conserve energy by moderating the atrium’s air temperature.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“Green building and sustainable design were a common goal for the designers, as well as the property owner,” says Xia. “Model-based design was essential, as many aspects of our performance-based design were realized through simulations and analyses,” adds Peng. For example, during the design phase the project team used the Revit Architecture model for whole-building energy analysis, giving the designers quantitative feedback on building energy performance. “We shared this information with our owners and consultants to better inform our design decisions and trade-offs,” says Peng.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Saving building materials</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The building shape itself will produce the largest energy savings in the form of an efficient, costeffective structural frame. “Using Revit Structure, we produced more than 20 design options before settling on a structural system of super-columns, with outrigger trusses supported by an inner concrete tower,” says Zhu.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The team kept iterating the design, including the rotation angle of the building’s cam-shaped outer skin, to analyze the structure’s resistance to wind and seismic loads. The result was well worth the effort. Gensler estimates that the building uses 32 percent less material than a conventional tower—saving material costs as well as the energy required to manufacture more steel and concrete.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Extending the value of BIM for building lifecycle management.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Improving construction efficiency</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Both the tower’s owner and its construction partners are requiring BIM models from all the project’s subcontractors to aid in construction coordination, planning, and digital fabrication.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">As an additional service, Autodesk Consulting also developed BIM submittal requirements for the owne —including the level of model detail required for coordination and construction planning—which were incorporated into requests for proposals for the Shanghai Tower.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">“By repurposing the design team’s digital building models for fabrication, and in turn using the subcontractors’ fabrication models for coordination, we are improving construction efficiency and reducing on-site rework and materials waste,” says Yu. “All the materials we use on-site are semifinished and ready for installation. The fabrication has already been done in the factories, which greatly improves our efficiency.”</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Extending BIM to lifecycle management</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Even after construction is complete, BIM will still play a vital role for the Shanghai Tower. Shanghai Tower Construction & Development plans on using BIM for the facility’s ongoing operations and maintenance, as well as for emergency and property management. At the onset of its engagement, Autodesk Consulting created plans that detailed the as-built information and models that the owner will require for the tower’s lifecycle management. “We plan to extend the value of BIM to help our facility management staff plan efficiently and manage the building scientifically,” reports Gu.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The result</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">With approximately 48 floors of the building’s core completed in 2011, the Shanghai Tower is on schedule for occupancy in 2014. “BIM helped our team produce a high-quality project and avoid many on-site changes, which would waste time, materials, and manpower,” says Gu. “Autodesk BIM solutions enable the different design disciplines to work together in a seamless fashion on a single information platform—boosting work efficiency, reducing errors, and improving both project and building performance.”</span>","alias":"autodeskr-revitr-autocadr-for-the-largest-skyscraper-in-china","roi":0,"seo":{"title":"Autodesk® Revit®, AutoCAD® for the largest skyscraper in China Shanghai Tower","keywords":"Autodesk Revit, AutoCAD, Shanghai Tower, Autodesk Navisworks Manage, Autodesk Ecotect Analysis, AutoCAD, users, case study, implementation","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Project summary</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">A striking new addition to the Shanghai skyl","og:title":"Autodesk® Revit®, AutoCAD® for the largest skyscraper in China Shanghai Tower","og:description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Project summary</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">A striking new addition to the Shanghai skyl"},"deal_info":"","user":{"id":4257,"title":"Shanghai Tower Construction Development Co., Ltd.","logoURL":"https://old.roi4cio.com/uploads/roi/company/Shanghai_Tower_Construction_Development_Co.__Ltd..jpg","alias":"shanghai-tower-construction-development-co-ltd","address":"","roles":[],"description":"Shanghai Tower Construction and Development Co., Ltd. was set up on December 5, 2007. The Shanghai Tower Construction & Development Co., Ltd., represents an equity partnership between Shanghai Municipal Investment(Group)Corporation, Luijiazui Finance & Trade Zone Development Co., Ltd., and Shanghai Construction Group. The three shareholders jointly provide fund for the development, construction and operation of Shanghai Tower. With a registered capital of 8.6 billion yuan (US$ 1250 million), the three shareholders have equity ratios of 51 percent, 45 percent and 4 percent, respectively. Shanghai Tower aims to become a landmark building, powered by the funding, technology and experience of its shareholders. The tower is fully conversant with market demand, and completes the functional allocation of a high-rise, making it a respectable, green, vertical city. The staff pursues the “highest, noblest and most exquisite” design and development objectives for Shanghai Tower with the corporation spirit of “passion, harmony, innovation, and practicality”.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.shanghaitower.com.cn/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Shanghai Tower Construction Development Co., Ltd.","keywords":"Shanghai, Tower, Construction, Development, percent, shareholders, development, with","description":"Shanghai Tower Construction and Development Co., Ltd. was set up on December 5, 2007. The Shanghai Tower Construction & Development Co., Ltd., represents an equity partnership between Shanghai Municipal Investment(Group)Corporation, Luijiazui Finance &","og:title":"Shanghai Tower Construction Development Co., Ltd.","og:description":"Shanghai Tower Construction and Development Co., Ltd. was set up on December 5, 2007. The Shanghai Tower Construction & Development Co., Ltd., represents an equity partnership between Shanghai Municipal Investment(Group)Corporation, Luijiazui Finance &","og:image":"https://old.roi4cio.com/uploads/roi/company/Shanghai_Tower_Construction_Development_Co.__Ltd..jpg"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":180,"title":"Autodesk","logoURL":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg","alias":"autodesk","address":"","roles":[],"description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a gallery of its customers' work in its San Francisco building. The company has offices worldwide, with U.S. locations in Northern California, Oregon, Colorado, Texas and in New England in New Hampshire and Massachusetts, and Canada locations in Ontario, Quebec, and Alberta.","companyTypes":[],"products":{},"vendoredProductsCount":15,"suppliedProductsCount":15,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":8,"vendorPartnersCount":0,"supplierPartnersCount":33,"b4r":0,"categories":{},"companyUrl":"www.autodesk.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Autodesk","keywords":"Autodesk, California, software, locations, with, worldwide, building, company","description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:title":"Autodesk","og:description":"Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industries. Autodesk is headquartered in San Rafael, California, and features a galler","og:image":"https://old.roi4cio.com/uploads/roi/company/autodesk_logo.jpeg"},"eventUrl":""}],"products":[{"id":1411,"logo":false,"scheme":false,"title":"Autodesk AutoCAD","vendorVerified":0,"rating":"3.40","implementationsCount":1,"suppliersCount":0,"alias":"autodesk-autocad","companyTypes":[],"description":"Developed and marketed by Autodesk, AutoCAD was first released in December 1982 as a desktop app running on microcomputers with internal graphics controllers. Since 2010, AutoCAD was released as a mobile- and web app as well, marketed as AutoCAD 360. Auto CAD and AutoCAD LT are available for English, German, French, Italian, Spanish, Korean, Chinese Simplified, Chinese Traditional, Brazilian Portuguese, Russian, Czech, Polish and Hungarian, Albanian (also through additional language packs). The extent of localization varies from full translation of the product to documentation only. The AutoCAD command set is localized as a part of the software localization. Source: https://en.wikipedia.org/wiki/AutoCAD","shortDescription":"AutoCAD is a commercial computer-aided design (CAD) and drafting software application. It is used across a wide range of industries, by architects, project managers, engineers and graphic designers.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Autodesk AutoCAD","keywords":"AutoCAD, localization, Autodesk, released, Chinese, marketed, Hungarian, Albanian","description":"Developed and marketed by Autodesk, AutoCAD was first released in December 1982 as a desktop app running on microcomputers with internal graphics controllers. Since 2010, AutoCAD was released as a mobile- and web app as well, marketed as AutoCAD 360. Auto CAD ","og:title":"Autodesk AutoCAD","og:description":"Developed and marketed by Autodesk, AutoCAD was first released in December 1982 as a desktop app running on microcomputers with internal graphics controllers. Since 2010, AutoCAD was released as a mobile- and web app as well, marketed as AutoCAD 360. Auto CAD "},"eventUrl":"","translationId":1411,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1414,"logo":false,"scheme":false,"title":"Autodesk Revit","vendorVerified":0,"rating":"3.70","implementationsCount":2,"suppliersCount":0,"alias":"autodesk-revit","companyTypes":[],"description":"<p><span style=\"font-weight: bold;\">What does Revit do?</span> Revit is software for BIM. Its powerful tools let you use the intelligent model-based process to plan, design, construct, and manage buildings and infrastructure. Revit supports a multidiscipline design process for collaborative design.</p>\r\n<ul>\r\n<li>Design. Model building components, analyze and simulate systems and structures, and iterate designs. Generate documentation from Revit models.</li>\r\n<li>Collaborate. Multiple project contributors can access centrally shared models. This results in better coordination, which helps reduce clashes and rework.</li>\r\n<li>Visualize. Communicate design intent more effectively to project owners and team members by using models to create high-impact 3D visuals.</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">One multidiscipline BIM platform</span> Revit has features for all disciplines involved in a building project. When architects, engineers, and construction professionals work on one unified platform, the risk of data translation errors can be reduced and the design process can be more predictable. <span style=\"font-weight: bold;\">Interoperability</span> Revit helps you work with members of an extended project team. It imports, exports, and links your data with commonly used formats, including IFC, DWG™ and DGN. <span style=\"font-weight: bold;\">Tools created expressly for your discipline</span> Whether you’re an architect; a mechanical, electrical, or plumbing (MEP) engineer; a structural engineer; or a construction professional, Revit offers BIM features specifically designed for you. <span style=\"font-weight: bold;\">For architects</span> Use Revit to take an idea from conceptual design to construction documentation within a single software environment. Optimize building performance and create stunning visualizations. <span style=\"font-weight: bold;\">For structural engineers</span> Use tools specific to structural design to create intelligent structure models in coordination with other building components. Evaluate how well they conform to building and safety regulations. <span style=\"font-weight: bold;\">For MEP engineers</span> Design MEP building systems with greater accuracy and in better coordination with architectural and structural components, using the coordinated and consistent information inherent in the intelligent model. <span style=\"font-weight: bold;\">For construction professionals</span> Evaluate constructability and design intent before construction begins. Gain a better understanding of the means, methods, and materials, and how they all come together. <span style=\"font-weight: bold;\">Connect teams with Collaboration for Revit</span> Extend Revit worksharing to project teams in almost any location with this service, which lets multiple users co-author Revit models in the cloud. Increase communication, centralize efforts of distributed teams, and let entire teams take part in the BIM process. <span style=\"font-weight: bold;\">Better team communication</span> Use real-time chat within project models. Know who’s working in the model and what they’re doing. <span style=\"font-weight: bold;\">Extended team integration</span> Subscribe to Collaboration for Revit and receive a subscription to BIM 360 Team, an integrated, cloud-based web service that provides centralized team access to project data. <span style=\"font-weight: bold;\">Access more projects</span> Extend your reach and participate in projects or joint venture partnerships, wherever they’re located. <span style=\"font-weight: bold;\">Better allocate team talents and resources</span> Assign the best team members with the strongest skill sets. Let designers work on multiple projects based in different locations at the same time. <span style=\"font-weight: bold;\">Minimize in-person meetings or co-location of teams</span> Help lower travel expenses and support greater work-life balance for team members. Visualization and rendering. Show how your product will look with visualization and rendering tools.</p>","shortDescription":"Revit® software for BIM (Building Information Modeling) includes features for architectural design, MEP and structural engineering, and construction.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Autodesk Revit","keywords":"","description":"<p><span style=\"font-weight: bold;\">What does Revit do?</span> Revit is software for BIM. Its powerful tools let you use the intelligent model-based process to plan, design, construct, and manage buildings and infrastructure. Revit supports a multidiscipline d","og:title":"Autodesk Revit","og:description":"<p><span style=\"font-weight: bold;\">What does Revit do?</span> Revit is software for BIM. Its powerful tools let you use the intelligent model-based process to plan, design, construct, and manage buildings and infrastructure. Revit supports a multidiscipline d"},"eventUrl":"","translationId":1414,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":780,"title":"CAD for architecture and construction - Computer-Aided Design","alias":"cad-for-architecture-and-construction-computer-aided-design","description":"Computer-aided design (CAD) is the use of computers (or workstations) to aid in the creation, modification, analysis or optimization of a design. CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation and to create a database for manufacturing. CAD output is often in the form of electronic files for print, machining or other manufacturing operations. The term CADD (for Computer Aided Design and Drafting) is also used.\r\nCAD may be used to design curves and figures in two-dimensional (2D) space or curves, surfaces and solids in three-dimensional (3D) space.\r\nCAD is an important industrial art extensively used in many applications, including architectural design, prosthetics and many more.\r\nSoftware for architecture - systems designed specifically for architects, whose tools allow you to build drawings and models from familiar objects (walls, columns, floors, etc.), to design buildings and facilities for industrial and civil construction. These programs have the tools to build three-dimensional models and obtain all the necessary working documentation and support modern technology of information modeling of buildings.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What is a CAD drafter or CAD Designer?</span></h1>\r\nEverything around us that is manufactured begins with an idea in a written plan. When these plans require illustrations or drawings to convey meaning, a CAD drafter is needed to prepare these ideas in graphic forms of communication. Drafters translate ideas and rough sketches of other professionals, such as architects and engineers, into scaled detail (or working) drawings. A CAD designer often prepares the plans and rough sketches for an architect or engineer. The designer has more education and thus more responsibility than the drafter but less than an architect or engineer.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What software do architects use?</span></h1>\r\n<p class=\"align-left\">Before computer-aided design software, architects relied solely on hand drawings and handmade architecture models to communicate their designs. With the evolution of technology and the architecture industry, architectural drafting software has changed the way architects plan and design buildings. Implementing 2D and 3D architecture software allows designers to draft at greater speed, test ideas and determine consistent project workflows. Advancements in rendering software provide architects and their clients with the ability to visually experience designs before a project is realized.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Is CAD 2D or 3D?</span></h1>\r\n<p class=\"align-left\">A common misconception surrounding CAD is that it is a 3D architecture software modeling tool only. However, CAD can be used as a 2D drawing tool as well. Construction designers might use a CAD tool that only works in 2D while architects might work in a 3D software architecture tools that has a 2D converter. It is highly dependent upon the actual platform used. This can be convenient because a company might only use a 2D tool and can pay for that tool alone. However, as construction centers around 3D modeling software for architecture and informational models, it will be harder for companies who only to use a 2D tool.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is CAD used for in construction?</span></h1>\r\n<p class=\"align-left\">There are a lot of uses for CAD in construction. Subcontractor’s designers can take the drawings made by the architect and add in additional necessary details to ensure constructability. From there they have a plan that they can work off of and check their work against. Companies have already done this to a degree of success. Some companies were able to use a combination of drones and 3D models to notice issues with the construction. Specifically, a company can overlay their live drone footage with the model. They could note that the foundation would be off and make corrections.</p>\r\n<p class=\"align-left\">Architecture planning software benefits contractors because the drawings and plans can be easily stored in the cloud. This allows for contractors to use their plans at any location. Also, if they are included in a shared file for the project, they can easily see changes to the plans. So, a subcontractor could quickly determine which changes were made, by who, and how it will impact construction.</p>\r\n<p class=\"align-left\">Another benefit of professional architecture software is it is more accurate than manual drawings. It’s easier for construction design software than it is when it’s manual. And it’s easier for subcontractors to add details than it is in manual drawings.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What architects’ tools have been transformed by technology?</span></h1>\r\nWorking methods that previously resulted in only the documentation of an idea are now moving toward the realization of a full virtual copy of a building and all its complex components before a single nail is hammered. As such, architects’ tools that used to be physical, like pens and pencils, are now mere basics in a virtual toolbox with capabilities an analog architect couldn’t even fathom. The breakneck pace of this change is good reason to reflect on the history of these architect software virtual tools by comparing them to their physical forebears.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Arm vs. Dynamic Input. </span>Appearing like an alien appendage affixed to a drawing board, a drafting arm originally consolidated a variety of tasks completed with separate rulers, straightedges and protractors into a single versatile tool. AutoCAD’s crosshair reticle, for example, once relied on manual input with compass-style designations before it featured point-and-click functionality with real-time metrics following it around the screen.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Tape Measure vs. Surveying App.</span> Documenting an existing building in order to plan its transformation is likely one of the most frequent tasks architects complete. Until recently, the only way to correctly do this was by hand, with a tape measure, pen and paper. Since the advent of infrared scanners, depth-sensing cameras and software that can communicate with them, the time-intensive process of surveying an existing space has been cut to a fraction of what it once was.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Template vs. Premade 3-D Models.</span> In the days of hand-drafting, adding furniture to a drawing meant choosing an appropriately scaled object from a stencil and tracing it. Today’s sophisticated equivalent that architecture software programs offer allows an infinite number of premade models to be brought into a wide range of design software with a single click. Despite technological advances in this practice, the old method may actually be advantageous due to its reliance on abstraction because choosing realistically detailed furnishings for an early design scheme often prompts cosmetic decisions long before they need to be made.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Electric Eraser vs. Undo.</span> The most simple, and, for this reason, the most underappreciated, transformation an architect’s tools have undergone between physical and virtual methods is the ease with which one can now reverse the work they’ve done. Allowing what essentially amounts to time travel, the Undo function is universal to almost all software programs and as such is often taken for granted. Prior to this wonderful invention, the savviest architects wielded handheld electric erasers allowing them to salvage large drawing sets in the event of a drafting mistake or last-minute design change.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Blueprint Machine vs. Inkjet Plotter. </span>If you hang around an architecture firm long enough, you might hear older designers talk about using a blueprint machine. Originally the premier method for producing copies of drawings, blueprint machines involved rolling an original drawing through a chemical mixture that reproduced the image on a special type of paper. For some time now, digital plotters have removed manual labor from the equation, being fed information directly from a virtual drawing file.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Digitizer Tablet vs. Touchscreen Workstation.</span> Early iterations of digital drafting were often paired with a digitizer: a special keyboard that could choose commands or be directly drawn on. Software used in architecture eventually got better at incorporating a keyboard and mouse, but nowadays the tide might be turning back to a hands-on approach as devices like Microsoft’s Surface Studio are pushing an interface with touch-heavy tools just for architects. Though currently limited to apps for sketching and drawing review, the way architects work could be changed forever if a large influential company like Autodesk or Graphisoft were to fully embrace touchscreen capabilities.</li></ul>\r\n\r\n<p class=\"align-left\"><br /><br /> <br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CAD.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":376,"title":"Unstructured data"},{"id":377,"title":"Separate communications channels"},{"id":398,"title":"Poor communication and coordination among staff"},{"id":399,"title":"No e-document flow"},{"id":400,"title":"High costs"}]}},"categories":[{"id":58,"title":"CAD for mechanical engineering - Computer-Aided Design","alias":"cad-for-mechanical-engineering-computer-aided-design","description":"The term "CAD in engineering" usually refers to packages that perform the functions of CAD/CAM/CAE/PDM, that is, computer-aided design, preproduction and design, and engineering data management.\r\nThe first CAD-systems appeared at the stage of computing technology - in the 60s. It was at General Motors that an interactive graphic production preparation system was created, and its creator, Dr. Patrick Henretti (the founder of CAD), was a manufacturing and consulting company (MCS), which had a huge impact on the development of this industry. industry. According to analysts, MCS ideas are based on almost 70% of modern CAD systems. In the early 80s, when the computing power of computers grew significantly, the first CAM packages appeared on the scene, which partially automate the production process using CNC programs and CAE products designed to analyze complex structures. Thus, by the mid-80s, the CAD system in mechanical engineering has a form that still exists. This year there were new players of the "middle weight category". Increased competition has stimulated product development: thanks to a convenient graphical user interface, their use has increased significantly, new solid state modeling mechanisms ACIS and Parasolid have appeared, which are currently used in many modern CAD systems, and the functionality has been significantly expanded.\r\nAccording to the analytical company Daratech, in 1999 the sales of CAD/CAM systems increased by 11.1% over the year, in 2000 by 4.7%, in 2001 by 3.5%, and in 2002 - by 1.3% (preliminary estimate). We can say that the transition to the new century has become a turning point for the CAD market. In this situation, two main trends emerged in the foreground. A striking example of the first trend is the purchase of EDS in 2001 by two well-known developers representing CAD systems - Unigraphics and SDRC, the second is the actively promoted PLM (Product Lifecycle Management) concept, which provides access to information throughout its life cycle.\r\nTraditionally, CAD products in mechanical engineering are divided into four classes: the heavy, medium, light and mature market. Such a classification has developed historically, and although there has long been talk that the boundaries between classes are about to be erased, they remain, since the systems still differ in price and functionality. As a result, now in this area there are several powerful systems, a kind of "oligarchs" of the CAD world, stably developing products of the middle class and inexpensive, easy-to-use programs that are widely distributed. There is also the so-called "non-class stratum of society", the role of which is performed by various specialized solutions.","materialsDescription":" <span style=\"font-weight: bold;\">Why implement CAD?</span>\r\nAt present, computer-aided design (CAD) systems of various types are commonly used at machine-building enterprises. Over the long history of use, they have proven their effectiveness and economic feasibility. However, most system manufacturers cannot give a clear and unambiguous answer, what economic effect will the purchase of their software bring?\r\nWhen choosing one or another system, it is difficult to unambiguously understand which solution will be the most suitable for an organization and why the introduction of CAD is generally necessary? To answer these questions, it is necessary, first of all, to determine the factors by which the economic efficiency of the implementation and use of the system is achieved, as well as refer to the world experience of using CAD systems.\r\nOne of the leaders conducting research in this area is the international research agency Aberdeen Group, which, together with Autodesk, since 2007, has issued a number of reports on this topic:\r\n<ul><li>Additional strategies for building digital and physical prototypes: how to avoid a crisis situation when developing products?</li><li>System design: Development of new products for mechatronics.</li><li>Technical Change Management 2.0: Intelligent Change Management to optimize business solutions.</li><li>Design without borders. Revenue growth through the use of 3D technology.</li></ul>\r\nThe organizations participating in the research were divided into three groups according to how they fulfill their calendar and budget: 20% are best-in-class companies (leading companies), 50% are companies with industry averages and 30% are companies with results below average. Then a comparative analysis was conducted to understand which processes, ways of organizing work and technology were more often used by the best-in-class companies.\r\nAccording to the results of research, the main economic factors affecting the economic efficiency of using CAD are time and money spent on developing prototypes of products of machine-building organizations, as well as time and costs of making changes to prototypes and manufactured products.\r\nThe participating companies were also interviewed about the main factors that, in their opinion, are the most significant prerequisites for the use of computer-aided design tools.\r\n<ul><li>91% of respondents put in the first place a reduction in product design time,</li><li>in second place with 38% - reducing the cost of design,</li><li>further follow: increase in manufacturability of designed products (30%), acceleration of product modifications in accordance with the requirements of Customers (product customization) - 15%.</li></ul>\r\nAn interesting feature is that, despite the great opportunities to reduce costs, as in previous studies, the key factor is the possibility of reducing the design time.\r\n<span style=\"font-weight: bold;\">Why use CAD the best engineering companies?</span>\r\nThe functionality of CAD, which is used by machine-building enterprises to achieve the above effects, can be divided into the following main areas:\r\n<ul><li>Development of the project concept in digital format.</li><li>Creation, optimization and approval of projects.</li><li>Design of electrical and mechanical parts.</li><li>Product data management.</li><li>Visualization of product solutions, reviews, sales and marketing.</li></ul>\r\nIt should be noted that the product data management functionality relates more to PDM / PLM solutions, however, computer-aided design systems are an integral part of them.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CAD_for_mechanical_engineering_-_Computer-Aided_Design.png"},{"id":780,"title":"CAD for architecture and construction - Computer-Aided Design","alias":"cad-for-architecture-and-construction-computer-aided-design","description":"Computer-aided design (CAD) is the use of computers (or workstations) to aid in the creation, modification, analysis or optimization of a design. CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation and to create a database for manufacturing. CAD output is often in the form of electronic files for print, machining or other manufacturing operations. The term CADD (for Computer Aided Design and Drafting) is also used.\r\nCAD may be used to design curves and figures in two-dimensional (2D) space or curves, surfaces and solids in three-dimensional (3D) space.\r\nCAD is an important industrial art extensively used in many applications, including architectural design, prosthetics and many more.\r\nSoftware for architecture - systems designed specifically for architects, whose tools allow you to build drawings and models from familiar objects (walls, columns, floors, etc.), to design buildings and facilities for industrial and civil construction. These programs have the tools to build three-dimensional models and obtain all the necessary working documentation and support modern technology of information modeling of buildings.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What is a CAD drafter or CAD Designer?</span></h1>\r\nEverything around us that is manufactured begins with an idea in a written plan. When these plans require illustrations or drawings to convey meaning, a CAD drafter is needed to prepare these ideas in graphic forms of communication. Drafters translate ideas and rough sketches of other professionals, such as architects and engineers, into scaled detail (or working) drawings. A CAD designer often prepares the plans and rough sketches for an architect or engineer. The designer has more education and thus more responsibility than the drafter but less than an architect or engineer.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What software do architects use?</span></h1>\r\n<p class=\"align-left\">Before computer-aided design software, architects relied solely on hand drawings and handmade architecture models to communicate their designs. With the evolution of technology and the architecture industry, architectural drafting software has changed the way architects plan and design buildings. Implementing 2D and 3D architecture software allows designers to draft at greater speed, test ideas and determine consistent project workflows. Advancements in rendering software provide architects and their clients with the ability to visually experience designs before a project is realized.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Is CAD 2D or 3D?</span></h1>\r\n<p class=\"align-left\">A common misconception surrounding CAD is that it is a 3D architecture software modeling tool only. However, CAD can be used as a 2D drawing tool as well. Construction designers might use a CAD tool that only works in 2D while architects might work in a 3D software architecture tools that has a 2D converter. It is highly dependent upon the actual platform used. This can be convenient because a company might only use a 2D tool and can pay for that tool alone. However, as construction centers around 3D modeling software for architecture and informational models, it will be harder for companies who only to use a 2D tool.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is CAD used for in construction?</span></h1>\r\n<p class=\"align-left\">There are a lot of uses for CAD in construction. Subcontractor’s designers can take the drawings made by the architect and add in additional necessary details to ensure constructability. From there they have a plan that they can work off of and check their work against. Companies have already done this to a degree of success. Some companies were able to use a combination of drones and 3D models to notice issues with the construction. Specifically, a company can overlay their live drone footage with the model. They could note that the foundation would be off and make corrections.</p>\r\n<p class=\"align-left\">Architecture planning software benefits contractors because the drawings and plans can be easily stored in the cloud. This allows for contractors to use their plans at any location. Also, if they are included in a shared file for the project, they can easily see changes to the plans. So, a subcontractor could quickly determine which changes were made, by who, and how it will impact construction.</p>\r\n<p class=\"align-left\">Another benefit of professional architecture software is it is more accurate than manual drawings. It’s easier for construction design software than it is when it’s manual. And it’s easier for subcontractors to add details than it is in manual drawings.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What architects’ tools have been transformed by technology?</span></h1>\r\nWorking methods that previously resulted in only the documentation of an idea are now moving toward the realization of a full virtual copy of a building and all its complex components before a single nail is hammered. As such, architects’ tools that used to be physical, like pens and pencils, are now mere basics in a virtual toolbox with capabilities an analog architect couldn’t even fathom. The breakneck pace of this change is good reason to reflect on the history of these architect software virtual tools by comparing them to their physical forebears.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Arm vs. Dynamic Input. </span>Appearing like an alien appendage affixed to a drawing board, a drafting arm originally consolidated a variety of tasks completed with separate rulers, straightedges and protractors into a single versatile tool. AutoCAD’s crosshair reticle, for example, once relied on manual input with compass-style designations before it featured point-and-click functionality with real-time metrics following it around the screen.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Tape Measure vs. Surveying App.</span> Documenting an existing building in order to plan its transformation is likely one of the most frequent tasks architects complete. Until recently, the only way to correctly do this was by hand, with a tape measure, pen and paper. Since the advent of infrared scanners, depth-sensing cameras and software that can communicate with them, the time-intensive process of surveying an existing space has been cut to a fraction of what it once was.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Drafting Template vs. Premade 3-D Models.</span> In the days of hand-drafting, adding furniture to a drawing meant choosing an appropriately scaled object from a stencil and tracing it. Today’s sophisticated equivalent that architecture software programs offer allows an infinite number of premade models to be brought into a wide range of design software with a single click. Despite technological advances in this practice, the old method may actually be advantageous due to its reliance on abstraction because choosing realistically detailed furnishings for an early design scheme often prompts cosmetic decisions long before they need to be made.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Electric Eraser vs. Undo.</span> The most simple, and, for this reason, the most underappreciated, transformation an architect’s tools have undergone between physical and virtual methods is the ease with which one can now reverse the work they’ve done. Allowing what essentially amounts to time travel, the Undo function is universal to almost all software programs and as such is often taken for granted. Prior to this wonderful invention, the savviest architects wielded handheld electric erasers allowing them to salvage large drawing sets in the event of a drafting mistake or last-minute design change.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Blueprint Machine vs. Inkjet Plotter. </span>If you hang around an architecture firm long enough, you might hear older designers talk about using a blueprint machine. Originally the premier method for producing copies of drawings, blueprint machines involved rolling an original drawing through a chemical mixture that reproduced the image on a special type of paper. For some time now, digital plotters have removed manual labor from the equation, being fed information directly from a virtual drawing file.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Digitizer Tablet vs. Touchscreen Workstation.</span> Early iterations of digital drafting were often paired with a digitizer: a special keyboard that could choose commands or be directly drawn on. Software used in architecture eventually got better at incorporating a keyboard and mouse, but nowadays the tide might be turning back to a hands-on approach as devices like Microsoft’s Surface Studio are pushing an interface with touch-heavy tools just for architects. Though currently limited to apps for sketching and drawing review, the way architects work could be changed forever if a large influential company like Autodesk or Graphisoft were to fully embrace touchscreen capabilities.</li></ul>\r\n\r\n<p class=\"align-left\"><br /><br /> <br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CAD.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://damassets.autodesk.net/content/dam/autodesk/www/products/autodesk-revit-family/docs/pdf/shanghai_tower_story_usletter_template_FY14.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":657,"title":"Barracuda Backup for a leader provider of technical solutions to the marine industry","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">Summary</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Drew Marine</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Headquarters in Whippany, NJ with</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">20 offices around the world and</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">600+ employees</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">Challenges:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Data not protected</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Lacked file restoration</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Information spread across multiple</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">offices around the globe</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Tape solution not feasible</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Ability for non-technical</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">employees to use solution</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">Solutions:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Five Barracuda Backup 190s</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Four Barracuda Backup 390s</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• One Barracuda Backup 490</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• One Barracuda Backup 690</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">Results:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Data is safely backed up</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Files can easily and quickly be restored</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Non-technical employees</span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">are able to administer it</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">• Central management</span>\r\n<span style=\"font-weight: bold;\">Tape Backups Labor-Intensive and Inefficient</span>\r\nWhen Drew Marine was sold, it was left with offices scattered around the globe and no IT team. There were no longer systems in place to protect or preserve vital company data. Griffith needed a fast solution and turned to tapes for a quick fix because on paper, that seemed to meet the company’s needs. Testing tape backups and restores between six different locations showed that it would be quite challenging and inefficient to use a tape solution. “Tapes don’t work when your offices are spread across the world,” said Griffith. Drew Marine does not have staff solely dedicated to IT in most locations, so sending tapes back and forth through the mail and having to explain what to do with them wasn’t working with its fast paced schedule. Immediately, Griffith saw that tape rotation and shipping time was going to impede his company’s ability to have secure, reliable, and efficient backups.\r\nGriffith was familiar with Symantec’s Backup Exec and CommVault backup solutions and knew they would not be able to meet Drew Marine’s needs. He decided to get demos and compare pricing for Iron Mountain, EVault, and Barracuda. <span style=\"font-style: italic; \">“I had always used expensive solutions in the past, but this time I was focused on something that was easy-to-use and affordable,” explained Griffith. Describing his demo experience, Griffith said, “I thought if the actual backup product was even half as good as what Barracuda had depicted, we would never need to use anything else. ”</span>\r\n<span style=\"font-weight: bold;\">Deployment and Implementation</span>\r\nDrew Marine has deployed eight Barracuda Backup appliances in three years: four Barracuda Backup 190s and four Barracuda Backup 490s. Griffith is happy that he does not have to hire an IT specialist for every Drew Marine location to handle Backups. Even the installation can be done without IT expertise. He says that it only requires plugging in hardware and typing in the IP address, and that he has successfully walked non-technical\r\nemployees through set-up in the past, saving IT resources.\r\n<span style=\"font-weight: bold;\">Fast File Restoration from Anywhere</span>\r\n<span style=\"font-style: italic;\">A much appreciated perk is fast, easy file restoration. Griffith explains, “It’s so easy. I get a call from Japan, roll out of bed, connect to the Internet, log in to the portal, restore the file, and go back to bed. The entire process takes less than five minutes, and the employee in Japan has his file back right away. You can’t do that with tape! Everyone’s happy.”</span>\r\n<span style=\"font-weight: bold;\">Conclusion</span>\r\nWhen Drew Marine’s data was left unprotected, Allwyn Griffith stepped in to rectify the problem. After trying a tape backup solution and finding it was inefficient, he tried more advanced solutions and chose Barracuda Networks. He has purchased four Barracuda Backup appliances and is thrilled with how easy they are to deploy, manage, and use to restore files. In addition, he’s happy that it doesn’t require any special training to deploy and use it.","alias":"barracuda-backup-for-a-leader-provider-of-technical-solutions-to-the-marine-industry","roi":0,"seo":{"title":"Barracuda Backup for a global service provider to the marine industry","keywords":"Solutions, Barracuda Backup 190s, Barracuda Backup 390s, Barracuda Backup 490, Barracuda Backup 690","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">Summary</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Drew Marine</span><span style=\"color: rgb(0, 0, 0);","og:title":"Barracuda Backup for a global service provider to the marine industry","og:description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">Summary</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Drew Marine</span><span style=\"color: rgb(0, 0, 0);"},"deal_info":"","user":{"id":4262,"title":"Drew Marine","logoURL":"https://old.roi4cio.com/uploads/roi/company/Drew_Marine.jpg","alias":"drew-marine","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Drew Marine is a global leader providing technical solutions and services to the marine industry with a comprehensive line of advanced marine chemicals, and equipment. Supported by a worldwide network of service engineers, and global supply chain delivering to more than 900 ports, we have a portfolio of products and services including:</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<ul><li>Water Treatment</li><li>Fuel Treatment</li><li>Tank and Hold Cleaners</li><li>General Maintenance & Sealing</li><li>Welding & Refrigeration</li><li>Firefighting, Safety & Rescue</li><li>Engineered Systems & Products</li><li>Onboard Test Kits</li><li>Analytical Services</li></ul>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.drew-marine.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Drew Marine","keywords":"global, Marine, services, marine, Drew, have, portfolio, TreatmentTank","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Drew Marine is a global leader providing technical solutions and services to the marine industry with a comprehensive line of advanced marine chemicals, and equipment. ","og:title":"Drew Marine","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Drew Marine is a global leader providing technical solutions and services to the marine industry with a comprehensive line of advanced marine chemicals, and equipment. ","og:image":"https://old.roi4cio.com/uploads/roi/company/Drew_Marine.jpg"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":183,"title":"Barracuda Networks","logoURL":"https://old.roi4cio.com/uploads/roi/company/barracuda_logo.png","alias":"barracuda-networks","address":"","roles":[],"description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and storage based on network devices and cloud services. Security products include solutions to protect against spam, web surfing, hackers and threats from instant messaging services. The platform also successfully combats such threats as spam, spyware, Trojans and other malware. Barracuda solutions provide web traffic filtering, load balancing, message archiving, backup services, data protection, and more.<br /><br />Today, more than 50,000 companies and security organizations around the world use Barracuda Networks solutions. The main product list includes solutions such as Barracuda Spam Firewall, Barracuda Web Filter, Barracuda IM Firewall. ","companyTypes":[],"products":{},"vendoredProductsCount":11,"suppliedProductsCount":11,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":15,"vendorPartnersCount":0,"supplierPartnersCount":3,"b4r":1,"categories":{},"companyUrl":"www.barracuda.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Barracuda Networks","keywords":"products, company, Barracuda, include, protection, services, storage, security","description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and stor","og:title":"Barracuda Networks","og:description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and stor","og:image":"https://old.roi4cio.com/uploads/roi/company/barracuda_logo.png"},"eventUrl":""}],"products":[{"id":1312,"logo":false,"scheme":false,"title":"Barracuda Backup","vendorVerified":0,"rating":"2.00","implementationsCount":2,"suppliersCount":0,"alias":"barracuda-backup","companyTypes":[],"description":"Barracuda Backup is a unified, cost-effective data protection solution for your physical, virtual, and SaaS environments. It’s a complete backup solution with remote storage that is easy to buy, install, and manage.\r\nPhysical and Virtual\r\nMost businesses today have a mixed environment of physical and virtual servers. Barracuda Backup is a single solution to protect physical servers and virtual machines (VMware & Hyper-V) with snapshot and granular file recovery—all with unified management for replication and retention.\r\nAll-in-One Backup Solution\r\nBarracuda Backup is a complete solution that comes from one vendor. It combines software, in-line deduplication, and offsite cloud or private replication without perserver or per-application licensing fees.\r\nFlexible Deployment\r\nBarracuda Backup is available as an all-inone physical appliance or a virtual appliance software offering for those wanting to leverage existing storage and compute infrastructures. Barracuda Backup can replicate data securely and efficiently from an on-premises physical or virtual backup appliance to Barracuda Cloud, a remote physical appliance, a remote virtual appliance, or Amazon Web Services (AWS).","shortDescription":"Barracuda Backup unified, cost-effective data protection solution for your physical, virtual environments. It’s a complete backup solution with remote storage that is easy to buy, install, and manage.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Backup","keywords":"Barracuda, Backup, physical, virtual, appliance, solution, with, remote","description":"Barracuda Backup is a unified, cost-effective data protection solution for your physical, virtual, and SaaS environments. It’s a complete backup solution with remote storage that is easy to buy, install, and manage.\r\nPhysical and Virtual\r\nMost businesses today","og:title":"Barracuda Backup","og:description":"Barracuda Backup is a unified, cost-effective data protection solution for your physical, virtual, and SaaS environments. It’s a complete backup solution with remote storage that is easy to buy, install, and manage.\r\nPhysical and Virtual\r\nMost businesses today"},"eventUrl":"","translationId":1393,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Data protection and recovery software provide data backup, integrity and security for data backups and it enables timely, reliable and secure backup of data from a host device to destination device. Recently, Data Protection and Recovery Software market are disrupted by innovative technologies such as server virtualization, disk-based backup, and cloud services where emerging players are playing an important role. Tier one players such as IBM, Hewlett Packard Enterprise, EMC Corporation, Symantec Corporation and Microsoft Corporation are also moving towards these technologies through partnerships and acquisitions.\r\nThe major factor driving data protection and recovery software market is the high adoption of cloud-based services and technologies. Many organizations are moving towards the cloud to reduce their operational expenses and to provide real-time access to their employees. However, increased usage of the cloud has increased the risk of data loss and data theft and unauthorized access to confidential information, which increases the demand for data protection and recovery solution suites.","materialsDescription":" \r\n<span style=\"font-weight: bold; \">What is Data recovery?</span>\r\nData recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).\r\nThe most common data recovery scenario involves an operating system failure, malfunction of a storage device, logical failure of storage devices, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the ultimate goal is simply to copy all important files from the damaged media to another new drive. This can be easily accomplished using a Live CD or DVD by booting directly from a ROM instead of the corrupted drive in question. Many Live CDs or DVDs provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioning and consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files.\r\nAnother scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data is not easily read from the media devices. Depending on the situation, solutions involve repairing the logical file system, partition table or master boot record, or updating the firmware or drive recovery techniques ranging from software-based recovery of corrupted data, hardware- and software-based recovery of damaged service areas (also known as the hard disk drive's "firmware"), to hardware replacement on a physically damaged drive which allows for extraction of data to a new drive. If a drive recovery is necessary, the drive itself has typically failed permanently, and the focus is rather on a one-time recovery, salvaging whatever data can be read.\r\nIn a third scenario, files have been accidentally "deleted" from a storage medium by the users. Typically, the contents of deleted files are not removed immediately from the physical drive; instead, references to them in the directory structure are removed, and thereafter space the deleted data occupy is made available for later data overwriting. In the mind of end users, deleted files cannot be discoverable through a standard file manager, but the deleted data still technically exists on the physical drive. In the meantime, the original file contents remain, often in a number of disconnected fragments, and may be recoverable if not overwritten by other data files.\r\nThe term "data recovery" is also used in the context of forensic applications or espionage, where data which have been encrypted or hidden, rather than damaged, are recovered. Sometimes data present in the computer gets encrypted or hidden due to reasons like virus attack which can only be recovered by some computer forensic experts.\r\n<span style=\"font-weight: bold;\">What is a backup?</span>\r\nA backup, or data backup, or the process of backing up, refers to the copying into an archive file of computer data that is already in secondary storage—so that it may be used to restore the original after a data loss event. The verb form is "back up" (a phrasal verb), whereas the noun and adjective form is "backup".\r\nBackups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users; a 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups represent a simple form of disaster recovery and should be part of any disaster recovery plan, backups by themselves should not be considered a complete disaster recovery plan. One reason for this is that not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server by simply restoring data from a backup.\r\nSince a backup system contains at least one copy of all data considered worth saving, the data storage requirements can be significant. Organizing this storage space and managing the backup process can be a complicated undertaking. A data repository model may be used to provide structure to the storage. Nowadays, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.\r\nBefore data are sent to their storage locations, they are selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Every backup scheme should include dry runs that validate the reliability of the data being backed up. It is important to recognize the limitations and human factors involved in any backup scheme.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Protection_and_Recovery_Software__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Data protection and recovery software provide data backup, integrity and security for data backups and it enables timely, reliable and secure backup of data from a host device to destination device. Recently, Data Protection and Recovery Software market are disrupted by innovative technologies such as server virtualization, disk-based backup, and cloud services where emerging players are playing an important role. Tier one players such as IBM, Hewlett Packard Enterprise, EMC Corporation, Symantec Corporation and Microsoft Corporation are also moving towards these technologies through partnerships and acquisitions.\r\nThe major factor driving data protection and recovery software market is the high adoption of cloud-based services and technologies. Many organizations are moving towards the cloud to reduce their operational expenses and to provide real-time access to their employees. However, increased usage of the cloud has increased the risk of data loss and data theft and unauthorized access to confidential information, which increases the demand for data protection and recovery solution suites.","materialsDescription":" \r\n<span style=\"font-weight: bold; \">What is Data recovery?</span>\r\nData recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).\r\nThe most common data recovery scenario involves an operating system failure, malfunction of a storage device, logical failure of storage devices, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the ultimate goal is simply to copy all important files from the damaged media to another new drive. This can be easily accomplished using a Live CD or DVD by booting directly from a ROM instead of the corrupted drive in question. Many Live CDs or DVDs provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioning and consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files.\r\nAnother scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data is not easily read from the media devices. Depending on the situation, solutions involve repairing the logical file system, partition table or master boot record, or updating the firmware or drive recovery techniques ranging from software-based recovery of corrupted data, hardware- and software-based recovery of damaged service areas (also known as the hard disk drive's "firmware"), to hardware replacement on a physically damaged drive which allows for extraction of data to a new drive. If a drive recovery is necessary, the drive itself has typically failed permanently, and the focus is rather on a one-time recovery, salvaging whatever data can be read.\r\nIn a third scenario, files have been accidentally "deleted" from a storage medium by the users. Typically, the contents of deleted files are not removed immediately from the physical drive; instead, references to them in the directory structure are removed, and thereafter space the deleted data occupy is made available for later data overwriting. In the mind of end users, deleted files cannot be discoverable through a standard file manager, but the deleted data still technically exists on the physical drive. In the meantime, the original file contents remain, often in a number of disconnected fragments, and may be recoverable if not overwritten by other data files.\r\nThe term "data recovery" is also used in the context of forensic applications or espionage, where data which have been encrypted or hidden, rather than damaged, are recovered. Sometimes data present in the computer gets encrypted or hidden due to reasons like virus attack which can only be recovered by some computer forensic experts.\r\n<span style=\"font-weight: bold;\">What is a backup?</span>\r\nA backup, or data backup, or the process of backing up, refers to the copying into an archive file of computer data that is already in secondary storage—so that it may be used to restore the original after a data loss event. The verb form is "back up" (a phrasal verb), whereas the noun and adjective form is "backup".\r\nBackups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users; a 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups represent a simple form of disaster recovery and should be part of any disaster recovery plan, backups by themselves should not be considered a complete disaster recovery plan. One reason for this is that not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server by simply restoring data from a backup.\r\nSince a backup system contains at least one copy of all data considered worth saving, the data storage requirements can be significant. Organizing this storage space and managing the backup process can be a complicated undertaking. A data repository model may be used to provide structure to the storage. Nowadays, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.\r\nBefore data are sent to their storage locations, they are selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Every backup scheme should include dry runs that validate the reliability of the data being backed up. It is important to recognize the limitations and human factors involved in any backup scheme.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Protection_and_Recovery_Software__1_.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.featuredcustomers.com/media/CustomerCaseStudy.document/barracuda-networks_drew-marine_18315.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":432,"title":"Barracuda NGFW For Dutch Insurance Provider","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Aevitae is a leading Dutch insurance provider company that protects hundreds of thousands of individuals through corporate and direct insurance plans. With a relatively small staff, they provide best-inclass insurance to a quarter-million customers across the Netherlands and processed over six million digital claims in 2016. On top of being the Netherlands’ leading insurance provider, they are also a technology pioneer, which they leverage as a key competitive advantage.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Profile</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Leading Dutch insurance provider company</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Provides corporate and direct insurance plans</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">200 employees</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">250,000 customers</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">800,000 paper claims, and over six million digital claims processed per year.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Challenges</span>\r\n<ul><li>Aging on-premises infrastructure</li><li>Seamless data security and visibility in a hybrid environment</li><li>Heightened security due to sensitive market (Insurance)</li></ul>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Solution</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Barracuda NextGen Firewall F-Series and Web Application Firewall deployed on Microsoft Azure cloud platform and on-premises</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Results</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">End-to-end visibility and security across a hybrid environment</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Ease of use and management</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Scalable and flexible platform that suits their dynamic business</span>","alias":"barracuda-ngfw-for-dutch-insurance-provider","roi":0,"seo":{"title":"Barracuda NGFW For Dutch Insurance Provider","keywords":"insurance, Dutch, claims, they, security, provider, Barracuda, platform","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Aevitae is a leading Dutch insurance provider company that protects hundreds of thousands of individuals through corporate and direct insurance plans. With a relatively smal","og:title":"Barracuda NGFW For Dutch Insurance Provider","og:description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Aevitae is a leading Dutch insurance provider company that protects hundreds of thousands of individuals through corporate and direct insurance plans. With a relatively smal"},"deal_info":"","user":{"id":4192,"title":"Aevitae B.V.","logoURL":"https://old.roi4cio.com/uploads/roi/company/Aevitae_B.V..png","alias":"aevitae-bv","address":"","roles":[],"description":"Aevitae B.V. provides health insurance and employee benefits solutions. The Company offers outdoors, liability, residential home, accident, legal aid, and car insurance. Aevitae operates in the Netherlands. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www3.aevitae.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Aevitae B.V.","keywords":"Aevitae, insurance, residential, operates, legal, accident, home, offers","description":"Aevitae B.V. provides health insurance and employee benefits solutions. The Company offers outdoors, liability, residential home, accident, legal aid, and car insurance. Aevitae operates in the Netherlands. ","og:title":"Aevitae B.V.","og:description":"Aevitae B.V. provides health insurance and employee benefits solutions. The Company offers outdoors, liability, residential home, accident, legal aid, and car insurance. Aevitae operates in the Netherlands. ","og:image":"https://old.roi4cio.com/uploads/roi/company/Aevitae_B.V..png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":163,"title":"Microsoft","logoURL":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png","alias":"microsoft","address":"Microsoft","roles":[],"description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface tablet lineup. As of 2011, it was the world's largest software maker by revenue, and one of the world's most valuable companies.","companyTypes":[],"products":{},"vendoredProductsCount":39,"suppliedProductsCount":39,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":66,"vendorPartnersCount":0,"supplierPartnersCount":272,"b4r":0,"categories":{},"companyUrl":"www.microsoft.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Microsoft","keywords":"Microsoft, software, world, products, hardware, Xbox, video, game","description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:title":"Microsoft","og:description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:image":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png"},"eventUrl":""},{"id":183,"title":"Barracuda Networks","logoURL":"https://old.roi4cio.com/uploads/roi/company/barracuda_logo.png","alias":"barracuda-networks","address":"","roles":[],"description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and storage based on network devices and cloud services. Security products include solutions to protect against spam, web surfing, hackers and threats from instant messaging services. The platform also successfully combats such threats as spam, spyware, Trojans and other malware. Barracuda solutions provide web traffic filtering, load balancing, message archiving, backup services, data protection, and more.<br /><br />Today, more than 50,000 companies and security organizations around the world use Barracuda Networks solutions. The main product list includes solutions such as Barracuda Spam Firewall, Barracuda Web Filter, Barracuda IM Firewall. ","companyTypes":[],"products":{},"vendoredProductsCount":11,"suppliedProductsCount":11,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":15,"vendorPartnersCount":0,"supplierPartnersCount":3,"b4r":1,"categories":{},"companyUrl":"www.barracuda.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Barracuda Networks","keywords":"products, company, Barracuda, include, protection, services, storage, security","description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and stor","og:title":"Barracuda Networks","og:description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and stor","og:image":"https://old.roi4cio.com/uploads/roi/company/barracuda_logo.png"},"eventUrl":""}],"products":[{"id":792,"logo":false,"scheme":false,"title":"Microsoft Azure","vendorVerified":0,"rating":"2.70","implementationsCount":7,"suppliersCount":0,"alias":"microsoft-azure","companyTypes":[],"description":"Microsoft lists over 600 Azure services, of which some are covered below: Compute Virtual machines, infrastructure as a service (IaaS) allowing users to launch general-purpose Microsoft Windows and Linux virtual machines, as well as preconfigured machine images for popular software packages. App services, platform as a service (PaaS) environment letting developers easily publish and manage Web sites. Websites, high density hosting of websites allows developers to build sites using ASP.NET, PHP, Node.js, or Python and can be deployed using FTP, Git, Mercurial, Team Foundation Server or uploaded through the user portal. This feature was announced in preview form in June 2012 at the Meet Microsoft Azure event.[5] Customers can create websites in PHP, ASP.NET, Node.js, or Python, or select from several open source applications from a gallery to deploy. This comprises one aspect of the platform as a service (PaaS) offerings for the Microsoft Azure Platform. It was renamed to Web Apps in April 2015. WebJobs, applications that can be deployed to a Web App to implement background processing. That can be invoked on a schedule, on demand or can run continuously. The Blob, Table and Queue services can be used to communicate between Web Apps and Web Jobs and to provide state. Mobile services Mobile Engagement collects real-time analytics that highlight users’ behavior. It also provides push notifications to mobile devices. HockeyApp can be used to develop, distribute, and beta-test mobile apps Storage services Storage Services provides REST and SDK APIs for storing and accessing data on the cloud. Table Service lets programs store structured text in partitioned collections of entities that are accessed by partition key and primary key. It's a NoSQL non-relational database. Blob Service allows programs to store unstructured text and binary data as blobs that can be accessed by a HTTP(S) path. Blob service also provides security mechanisms to control access to data. Queue Service lets programs communicate asynchronously by message using queues. File Service allows storing and access of data on the cloud using the REST APIs or the SMB protocol. Data management Azure Search provides text search and a subset of OData's structured filters using REST or SDK APIs. DocumentDB is a NoSQL database service that implements a subset of the SQL SELECT statement on JSON documents. Redis Cache is a managed implementation of Redis. StorSimple manages storage tasks between on-premises devices and cloud storage. SQL Database, formerly known as SQL Azure Database, works to create, scale and extend applications into the cloud using Microsoft SQL Server technology. It also integrates with Active Directory and Microsoft System Center and Hadoop. SQL Data Warehouse is a data warehousing service designed to handle computational and data intensive queries on datasets exceeding 1TB. Messaging The Microsoft Azure Service Bus allows applications running on Azure premises or off premises devices to communicate with Azure. This helps to build scalable and reliable applications in a service-oriented architecture (SOA). Event Hubs, which provide event and telemetry ingress to the cloud at massive scale, with low latency and high reliability. For example an event hub can be used to track data from cell phones such as a GPS location coordinate in real time. Queues, which allow one-directional communication. A sender application would send the message to the service bus queue, and a receiver would read from the queue. Though there can be multiple readers for the queue only one would process a single message. Topics, which provide one-directional communication using a subscriber pattern. It is similar to a queue, however each subscriber will receive a copy of the message sent to a Topic. Optionally the subscriber can filter out messages based on specific criteria defined by the subscriber. Relays, which provide bi-directional communication. Unlike queues and topics, a relay doesn't store in-flight messages in its own memory. Instead, it just passes them on to the destination application.","shortDescription":"Microsoft Azure is a cloud computing service created by Microsoft for building, deploying, and managing applications and services through a global network of Microsoft-managed data centers. \r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Azure","keywords":"Azure, Microsoft, service, using, data, cloud, Service, which","description":"Microsoft lists over 600 Azure services, of which some are covered below: Compute Virtual machines, infrastructure as a service (IaaS) allowing users to launch general-purpose Microsoft Windows and Linux virtual machines, as well as preconfigured machine image","og:title":"Microsoft Azure","og:description":"Microsoft lists over 600 Azure services, of which some are covered below: Compute Virtual machines, infrastructure as a service (IaaS) allowing users to launch general-purpose Microsoft Windows and Linux virtual machines, as well as preconfigured machine image"},"eventUrl":"","translationId":793,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1399,"logo":false,"scheme":false,"title":"Barracuda NextGen Firewall (NGFW)","vendorVerified":0,"rating":"3.00","implementationsCount":4,"suppliersCount":0,"alias":"barracuda-nextgen-firewall-ngfw","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications. The Barracuda NextGen Firewall F-Series is a family of hardware, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control. In addition, the F-Series combines highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network. The F-Series cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures.\r\n<span style=\"font-weight: bold;\">Security for the Cloud Era</span>\r\nSecurity paradigms are shifting—and securing your network perimeter is no longer good enough. In the cloud era, workloads happen everywhere, users are increasingly mobile, and potential attack surfaces are multiplying. Barracuda NextGen Firewall F-Series is purpose-built to deal with the challenges of securing widely distributed networks.\r\n<span style=\"font-weight: bold;\">Advanced Threat Protection</span>\r\nIn today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput.\r\n<span style=\"font-weight: bold;\">Secure SD-WAN..</span>\r\nBarracuda Cloud Era Firewalls include full next gen Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application.\r\n<span style=\"font-weight: bold;\">This enables:</span>\r\n\r\n<ul> <li>Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance</li> <li>VPN across multiple broadband connections and MPLs replacement</li> <li>Up to 24 physical uplinks to create highly redundant VPN tunnels</li> <li>Replacing network backhauling central policy enforcement architectures with direct internet break outs</li> <li>Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic</li> <li>Guaranteed users' access to critical applications through granular policy controls</li> <li>Increased available bandwidth with built-in traffic compression and data deduplication</li> <li>Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic</li> </ul>\r\n<span style=\"font-weight: bold;\">Why Barracuda NextGen Firewall?</span> When selecting security technology, it is critical that your products are supported by people who take your data security as seriously as you do. The Barracuda NextGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data. The Barracuda NextGen Firewall is part of a comprehensive line of data protection, network firewall, and security products and services designed for organizations seeking robust yet affordable protection from ever-increasing cyber threats.\r\n<span style=\"font-style: italic;\">Source: https://www.barracuda.com/products/nextgenfirewall_f</span>","shortDescription":"Barracuda's Next Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda NextGen Firewall (NGFW)","keywords":"","description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted ","og:title":"Barracuda NextGen Firewall (NGFW)","og:description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted "},"eventUrl":"","translationId":1400,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"},{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.barracuda.com/resources/Barracuda_NextGen_Firewall_F_Azure_CS_Aevitae_US#top","title":"Media"}},"comments":[],"referencesCount":0},{"id":655,"title":"Barracuda NGFW for Dutch insurance provider","description":"Description is not ready yet","alias":"barracuda-ngfw-for-dutch-insurance-provider","roi":0,"seo":{"title":"Barracuda NGFW for Dutch insurance provider","keywords":"","description":"Description is not ready yet","og:title":"Barracuda NGFW for Dutch insurance provider","og:description":"Description is not ready yet"},"deal_info":"","user":{"id":4192,"title":"Aevitae B.V.","logoURL":"https://old.roi4cio.com/uploads/roi/company/Aevitae_B.V..png","alias":"aevitae-bv","address":"","roles":[],"description":"Aevitae B.V. provides health insurance and employee benefits solutions. The Company offers outdoors, liability, residential home, accident, legal aid, and car insurance. Aevitae operates in the Netherlands. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www3.aevitae.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Aevitae B.V.","keywords":"Aevitae, insurance, residential, operates, legal, accident, home, offers","description":"Aevitae B.V. provides health insurance and employee benefits solutions. The Company offers outdoors, liability, residential home, accident, legal aid, and car insurance. Aevitae operates in the Netherlands. ","og:title":"Aevitae B.V.","og:description":"Aevitae B.V. provides health insurance and employee benefits solutions. The Company offers outdoors, liability, residential home, accident, legal aid, and car insurance. Aevitae operates in the Netherlands. ","og:image":"https://old.roi4cio.com/uploads/roi/company/Aevitae_B.V..png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":163,"title":"Microsoft","logoURL":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png","alias":"microsoft","address":"Microsoft","roles":[],"description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface tablet lineup. As of 2011, it was the world's largest software maker by revenue, and one of the world's most valuable companies.","companyTypes":[],"products":{},"vendoredProductsCount":39,"suppliedProductsCount":39,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":66,"vendorPartnersCount":0,"supplierPartnersCount":272,"b4r":0,"categories":{},"companyUrl":"www.microsoft.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Microsoft","keywords":"Microsoft, software, world, products, hardware, Xbox, video, game","description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:title":"Microsoft","og:description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:image":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png"},"eventUrl":""},{"id":183,"title":"Barracuda Networks","logoURL":"https://old.roi4cio.com/uploads/roi/company/barracuda_logo.png","alias":"barracuda-networks","address":"","roles":[],"description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and storage based on network devices and cloud services. Security products include solutions to protect against spam, web surfing, hackers and threats from instant messaging services. The platform also successfully combats such threats as spam, spyware, Trojans and other malware. Barracuda solutions provide web traffic filtering, load balancing, message archiving, backup services, data protection, and more.<br /><br />Today, more than 50,000 companies and security organizations around the world use Barracuda Networks solutions. The main product list includes solutions such as Barracuda Spam Firewall, Barracuda Web Filter, Barracuda IM Firewall. ","companyTypes":[],"products":{},"vendoredProductsCount":11,"suppliedProductsCount":11,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":15,"vendorPartnersCount":0,"supplierPartnersCount":3,"b4r":1,"categories":{},"companyUrl":"www.barracuda.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Barracuda Networks","keywords":"products, company, Barracuda, include, protection, services, storage, security","description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and stor","og:title":"Barracuda Networks","og:description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and stor","og:image":"https://old.roi4cio.com/uploads/roi/company/barracuda_logo.png"},"eventUrl":""}],"products":[{"id":792,"logo":false,"scheme":false,"title":"Microsoft Azure","vendorVerified":0,"rating":"2.70","implementationsCount":7,"suppliersCount":0,"alias":"microsoft-azure","companyTypes":[],"description":"Microsoft lists over 600 Azure services, of which some are covered below: Compute Virtual machines, infrastructure as a service (IaaS) allowing users to launch general-purpose Microsoft Windows and Linux virtual machines, as well as preconfigured machine images for popular software packages. App services, platform as a service (PaaS) environment letting developers easily publish and manage Web sites. Websites, high density hosting of websites allows developers to build sites using ASP.NET, PHP, Node.js, or Python and can be deployed using FTP, Git, Mercurial, Team Foundation Server or uploaded through the user portal. This feature was announced in preview form in June 2012 at the Meet Microsoft Azure event.[5] Customers can create websites in PHP, ASP.NET, Node.js, or Python, or select from several open source applications from a gallery to deploy. This comprises one aspect of the platform as a service (PaaS) offerings for the Microsoft Azure Platform. It was renamed to Web Apps in April 2015. WebJobs, applications that can be deployed to a Web App to implement background processing. That can be invoked on a schedule, on demand or can run continuously. The Blob, Table and Queue services can be used to communicate between Web Apps and Web Jobs and to provide state. Mobile services Mobile Engagement collects real-time analytics that highlight users’ behavior. It also provides push notifications to mobile devices. HockeyApp can be used to develop, distribute, and beta-test mobile apps Storage services Storage Services provides REST and SDK APIs for storing and accessing data on the cloud. Table Service lets programs store structured text in partitioned collections of entities that are accessed by partition key and primary key. It's a NoSQL non-relational database. Blob Service allows programs to store unstructured text and binary data as blobs that can be accessed by a HTTP(S) path. Blob service also provides security mechanisms to control access to data. Queue Service lets programs communicate asynchronously by message using queues. File Service allows storing and access of data on the cloud using the REST APIs or the SMB protocol. Data management Azure Search provides text search and a subset of OData's structured filters using REST or SDK APIs. DocumentDB is a NoSQL database service that implements a subset of the SQL SELECT statement on JSON documents. Redis Cache is a managed implementation of Redis. StorSimple manages storage tasks between on-premises devices and cloud storage. SQL Database, formerly known as SQL Azure Database, works to create, scale and extend applications into the cloud using Microsoft SQL Server technology. It also integrates with Active Directory and Microsoft System Center and Hadoop. SQL Data Warehouse is a data warehousing service designed to handle computational and data intensive queries on datasets exceeding 1TB. Messaging The Microsoft Azure Service Bus allows applications running on Azure premises or off premises devices to communicate with Azure. This helps to build scalable and reliable applications in a service-oriented architecture (SOA). Event Hubs, which provide event and telemetry ingress to the cloud at massive scale, with low latency and high reliability. For example an event hub can be used to track data from cell phones such as a GPS location coordinate in real time. Queues, which allow one-directional communication. A sender application would send the message to the service bus queue, and a receiver would read from the queue. Though there can be multiple readers for the queue only one would process a single message. Topics, which provide one-directional communication using a subscriber pattern. It is similar to a queue, however each subscriber will receive a copy of the message sent to a Topic. Optionally the subscriber can filter out messages based on specific criteria defined by the subscriber. Relays, which provide bi-directional communication. Unlike queues and topics, a relay doesn't store in-flight messages in its own memory. Instead, it just passes them on to the destination application.","shortDescription":"Microsoft Azure is a cloud computing service created by Microsoft for building, deploying, and managing applications and services through a global network of Microsoft-managed data centers. \r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Azure","keywords":"Azure, Microsoft, service, using, data, cloud, Service, which","description":"Microsoft lists over 600 Azure services, of which some are covered below: Compute Virtual machines, infrastructure as a service (IaaS) allowing users to launch general-purpose Microsoft Windows and Linux virtual machines, as well as preconfigured machine image","og:title":"Microsoft Azure","og:description":"Microsoft lists over 600 Azure services, of which some are covered below: Compute Virtual machines, infrastructure as a service (IaaS) allowing users to launch general-purpose Microsoft Windows and Linux virtual machines, as well as preconfigured machine image"},"eventUrl":"","translationId":793,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1399,"logo":false,"scheme":false,"title":"Barracuda NextGen Firewall (NGFW)","vendorVerified":0,"rating":"3.00","implementationsCount":4,"suppliersCount":0,"alias":"barracuda-nextgen-firewall-ngfw","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications. The Barracuda NextGen Firewall F-Series is a family of hardware, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control. In addition, the F-Series combines highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network. The F-Series cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures.\r\n<span style=\"font-weight: bold;\">Security for the Cloud Era</span>\r\nSecurity paradigms are shifting—and securing your network perimeter is no longer good enough. In the cloud era, workloads happen everywhere, users are increasingly mobile, and potential attack surfaces are multiplying. Barracuda NextGen Firewall F-Series is purpose-built to deal with the challenges of securing widely distributed networks.\r\n<span style=\"font-weight: bold;\">Advanced Threat Protection</span>\r\nIn today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput.\r\n<span style=\"font-weight: bold;\">Secure SD-WAN..</span>\r\nBarracuda Cloud Era Firewalls include full next gen Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application.\r\n<span style=\"font-weight: bold;\">This enables:</span>\r\n\r\n<ul> <li>Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance</li> <li>VPN across multiple broadband connections and MPLs replacement</li> <li>Up to 24 physical uplinks to create highly redundant VPN tunnels</li> <li>Replacing network backhauling central policy enforcement architectures with direct internet break outs</li> <li>Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic</li> <li>Guaranteed users' access to critical applications through granular policy controls</li> <li>Increased available bandwidth with built-in traffic compression and data deduplication</li> <li>Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic</li> </ul>\r\n<span style=\"font-weight: bold;\">Why Barracuda NextGen Firewall?</span> When selecting security technology, it is critical that your products are supported by people who take your data security as seriously as you do. The Barracuda NextGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data. The Barracuda NextGen Firewall is part of a comprehensive line of data protection, network firewall, and security products and services designed for organizations seeking robust yet affordable protection from ever-increasing cyber threats.\r\n<span style=\"font-style: italic;\">Source: https://www.barracuda.com/products/nextgenfirewall_f</span>","shortDescription":"Barracuda's Next Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda NextGen Firewall (NGFW)","keywords":"","description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted ","og:title":"Barracuda NextGen Firewall (NGFW)","og:description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted "},"eventUrl":"","translationId":1400,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"},{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.barracuda.com/resources/Barracuda_NextGen_Firewall_F_Azure_CS_Aevitae_US#top","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":660,"title":"Barracuda Sentinel for airlines","description":"Challenges\r\n<ul><li>Stakeholders emails were being bombarded with spam</li><li>Account compromise led to employees receiving targeted phishing emails</li></ul>\r\nResults\r\n<ul><li>Protected from spam, malware, and targeted spearphishing attacks</li><li>Brand and reputation defended against account compromise and domain spoofing</li><li>Rapid, easy deployment</li></ul>\r\nCape Air not only serves consumers, but also has partnerships with major airlines that it corresponds with on a regular basis. So, it would not be unusual for those organizations to receive emails from Cape Air—as well as emails from attackers who use domain spoofing to hijack Cape Air’s brand identity. \r\n<blockquote>Gifford explains, “If an account gets compromised and then that compromised account goes on to attack one of our partners, that’s not acceptable to me.” </blockquote>\r\nTherefore, DMARC was also something that needed to be implemented immediately.\r\nGifford started looking for an email security solution that would address the gaps in Office 365, secure his users against targeted attacks, and protect Cape Air’s brand and reputation. He had heard about Barracuda and its security solutions, and when he watched a Barracuda Essentials and Sentinel demo, he liked what he saw. \r\nCape Air was one of the earliest Barracuda Sentinel customers.\r\nBarracuda Sentinel has helped reduce incidents of account compromise by blocking web impersonation emails (e.g., emails that pretend to come from Office 365), which lead to the theft of employee credentials. Barracuda Sentinel also provides domain fraud visibility protection using DMARC authentication, which ensures that no one can hijack Cape Air’s brand. \r\n<blockquote>Gifford says, “I think Sentinel is a ground-breaking program. The thing about AI is that it just gets better.”</blockquote>\r\nBarracuda Sentinel does an excellent job of catching phishing and spear phishing attempts, and Gifford couldn’t be happier.\r\nHe describes Barracuda Sentinel as being “the best thing since sliced bread.” \r\nBefore implementing Barracuda’s email protection, Cape Air faced a lot of spam and their users were flooded with phishing and spear phishing attacks. Cape Air has seen an enormous drop in the number of email attacks since it adopted Barracuda’s email solutions. Phishing and spear-phishing attempts to trap unaware and innocent users are a thing of the past, and almost 100% of all virus and malware traffic is blocked. \r\n<blockquote>“My complaints from end users have dropped significantly,” Gifford says. </blockquote>\r\nCape Air has had no further incidents since it started using Barracuda’s email protection. Gifford says he’s been happy ever since.","alias":"barracuda-sentinel-for-airlines","roi":0,"seo":{"title":"Barracuda Sentinel for airlines","keywords":"","description":"Challenges\r\n<ul><li>Stakeholders emails were being bombarded with spam</li><li>Account compromise led to employees receiving targeted phishing emails</li></ul>\r\nResults\r\n<ul><li>Protected from spam, malware, and targeted spearphishing attacks</li><li>Brand and","og:title":"Barracuda Sentinel for airlines","og:description":"Challenges\r\n<ul><li>Stakeholders emails were being bombarded with spam</li><li>Account compromise led to employees receiving targeted phishing emails</li></ul>\r\nResults\r\n<ul><li>Protected from spam, malware, and targeted spearphishing attacks</li><li>Brand and"},"deal_info":"","user":{"id":5062,"title":"Cape Air","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cape_Air.png","alias":"cape-air","address":"","roles":[],"description":"Airline headquartered at Barnstable Municipal Airport in Hyannis, Massachusetts\r\nPrimarily flies short runs between its hubs and smallercommunity airports (roughly 100 miles on average)\r\nFounded in 1989 ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.capeair.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cape Air","keywords":"","description":"Airline headquartered at Barnstable Municipal Airport in Hyannis, Massachusetts\r\nPrimarily flies short runs between its hubs and smallercommunity airports (roughly 100 miles on average)\r\nFounded in 1989 ","og:title":"Cape Air","og:description":"Airline headquartered at Barnstable Municipal Airport in Hyannis, Massachusetts\r\nPrimarily flies short runs between its hubs and smallercommunity airports (roughly 100 miles on average)\r\nFounded in 1989 ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cape_Air.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":183,"title":"Barracuda Networks","logoURL":"https://old.roi4cio.com/uploads/roi/company/barracuda_logo.png","alias":"barracuda-networks","address":"","roles":[],"description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and storage based on network devices and cloud services. Security products include solutions to protect against spam, web surfing, hackers and threats from instant messaging services. The platform also successfully combats such threats as spam, spyware, Trojans and other malware. Barracuda solutions provide web traffic filtering, load balancing, message archiving, backup services, data protection, and more.<br /><br />Today, more than 50,000 companies and security organizations around the world use Barracuda Networks solutions. The main product list includes solutions such as Barracuda Spam Firewall, Barracuda Web Filter, Barracuda IM Firewall. ","companyTypes":[],"products":{},"vendoredProductsCount":11,"suppliedProductsCount":11,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":15,"vendorPartnersCount":0,"supplierPartnersCount":3,"b4r":1,"categories":{},"companyUrl":"www.barracuda.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Barracuda Networks","keywords":"products, company, Barracuda, include, protection, services, storage, security","description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and stor","og:title":"Barracuda Networks","og:description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and stor","og:image":"https://old.roi4cio.com/uploads/roi/company/barracuda_logo.png"},"eventUrl":""}],"products":[{"id":1908,"logo":false,"scheme":false,"title":"Barracuda Sentinel","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"barracuda-sentinel","companyTypes":[],"description":"<span style=\"font-weight: bold;\">A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise</span> <span style=\"font-weight: bold;\">Stop Targeted Attacks Before They Reach Your Users</span> \r\nBusiness Email Compromise (BEC) has cost businesses $12B since 2013 plus untold additional losses from lost productivity and damage to reputation. Email impersonation attacks have tricked individuals into sending wire transfers and sensitive customer and employee information to attackers who are impersonating their CEO, boss, or trusted colleague. Barracuda Sentinel uses artificial intelligence and deep integration with Office 365 to stop these attacks before they reach your mail server, as well as detecting threats already sitting in your inbox. \r\n<span style=\"font-weight: bold; text-decoration-line: underline;\">Benefits of Barracuda Sentinel</span> \r\n<span style=\"font-weight: bold;\">Stop Email Impersonation Attacks</span> \r\nTraditional email filters sit in front of your mail server, so they don't see threats already in your inbox. Sentinel works from inside O365 and uses artificial intelligence to detect signs of spear phishing and account takeover. \r\n<span style=\"font-weight: bold;\">Protect Your Business from Account Takeover</span> \r\nAccount takeover is a major new threat to business data. Sentinel detects account takeover attempts and blocks email attacks launched from compromised accounts. <span style=\"font-weight: bold;\">Protect Your Reputation and Stop Domain Fraud</span> Don't let hackers impersonate your domain to launch email attacks. Sentinel protects your brand and reputation through simplified DMARC reporting and analysis. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\"></span>\r\n<span style=\"font-weight: bold;\">Identify and Secure Your Highest-Risk Individuals</span> \r\nSentinel uses machine learning to automatically identify the people within your organization who are most likely to be targeted. \r\n<span style=\"font-weight: bold;\">Part of a Complete Email Protection Platform</span> \r\nWith the Total Email Protection edition, Sentinel is combined with Barracuda Essentials and PhishLine for a complete email security, archiving, and data protection solution. \r\n<span style=\"font-weight: bold;\">Sentinel Detects Threats that Email Security Gateways Can't</span> \r\nSentinel detects threats that traditional email security systems can't. It integrates directly with Microsoft Office 365 APIs to detect attacks coming from both internal and external sources, including threats that may already be in your inbox. It uses artificial intelligence to detect signs of malicious intent and deception within every email with virtually no I.T. administration required. \r\n<span style=\"font-weight: bold;\">Protect Your Business Against Account Takeover</span> \r\nCorporate Account Takeover presents a significant new threat to business. Hackers gain access to corporate email accounts through stolen credentials and use them to launch subsequent targeted attacks, internally and against external targets. Account takeover or attacks that originate from these accounts are almost impossible to detect since they don’t leverage impersonation techniques—they come from a legitimate account and appear to be from a trusted source. In fact, traditional email security solutions don’t even observe internal traffic and have no way of stopping an attack originating internally. Barracuda Sentinel detects both account takeover attempts and attacks launched from compromised accounts. By analyzing both historical and inbound data Sentinel is able to identify behavioral, content, and link-forwarding anomalies within your organization, and to flag and quarantine fraudulent emails. It is also able to prevent attempts to compromise employee credentials by automatically blocking targeted phishing emails that try to harvest employee passwords. \r\n<span style=\"font-weight: bold;\">Features</span> \r\n<span style=\"font-weight: bold;\">Stop Targeted Attacks with AI</span>\r\n<ul> <li>Prevent Spear Phishing</li> <li>Prevent BEC and CEO Fraud</li> <li>Detect Employee Impersonation</li> <li>Stop Zero-Day Phishing</li> <li>Detect Web Impersonation</li> <li>Stop Inbound Spoofing</li> <li>Continuous Learning</li> <li>Exportable Reports</li> </ul>\r\n<span style=\"font-weight: bold;\">Stop Account Takeover with AI</span>\r\n<ul> <li>Alerting for Account Takeover</li> <li>Prevent Account Takeover Infiltration</li> <li>Detect Compromised Emails</li> <li>Delete Emails Sent Internally</li> <li>Notify External Recipients</li> <li>Lock Attackers Out of Accounts</li> </ul>\r\n<span style=\"font-weight: bold;\">Domain Fraud Prevention</span>\r\n<ul> <li>Prevent Third Party Domain Spoofing</li> <li>Automated DMARC Reporting</li> <li>DMARC Aggregation and Visualization</li> <li>DKIM/SPF Configuration and Troubleshooting</li> <li>Better Email Deliverability</li> <li>Spoofed Email Reports</li> <li>Detect Misconfigured Legitimate Senders</li> <li>Protects Customer Brands</li> <li>Exportable Reports</li> </ul>\r\n<span style=\"font-weight: bold;\">Flexible API-based Deployment</span>\r\n<ul> <li>Lightweight Architecture</li> <li>Instant Setup</li> <li>Works with Any Gateway</li> <li>Historical Assessment</li> </ul>\r\n<span style=\"font-weight: bold;\">Phishing Simulations</span>\r\n<ul> <li>Test Employee Security Awareness</li> <li>80 Real-World Templates</li> <li>Simulate Impersonation and BEC</li> <li>AI Determines Employee Risk</li> </ul>","shortDescription":"Barracuda Sentinel is A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Sentinel","keywords":"","description":"<span style=\"font-weight: bold;\">A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise</span> <span style=\"font-weight: bold;\">Stop Targeted Attacks Before They Reach Your Users</span> \r\nBusiness Email Compromise (BEC) has ","og:title":"Barracuda Sentinel","og:description":"<span style=\"font-weight: bold;\">A.I.-Based Protection from Spear Phishing, Account Takeover, and Business Email Compromise</span> <span style=\"font-weight: bold;\">Stop Targeted Attacks Before They Reach Your Users</span> \r\nBusiness Email Compromise (BEC) has "},"eventUrl":"","translationId":1911,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":483,"title":"Messaging Security","alias":"messaging-security","description":"<span style=\"font-weight: bold; \">Messaging security</span> is a subcategory of <span style=\"font-style: italic; \">unified threat management (UTM) </span>focused on securing and protecting an organization’s communication infrastructure. Communication channels can include email software, messaging apps, and social network IM platforms. This extra layer of security can help secure devices and block a wider range of viruses or malware attacks.\r\nMessaging security helps to ensure the confidentiality and authenticity of an organization’s communication methods. Confidentiality refers to making sure only the intended recipients are able to read the messages and authenticity refers to making sure the identity of each sender or recipient is verified.\r\nOftentimes, attackers aim to gain access to an entire network or system by infiltrating the messaging infrastructure. Implementing proper data and message security can minimize the chance of data leaks and identity theft.\r\n<span style=\"color: rgb(97, 97, 97); \">Encrypted messaging (also known as secure messaging) provides end-to-end encryption for user-to-user text messaging. Encrypted messaging prevents anyone from monitoring text conversations. Many encrypted messenger apps also offer end-to-end encryption for phone calls made using the apps, as well as for files that are sent using the apps.</span>\r\nTwo modern methods of encryption are the <span style=\"font-style: italic; \">Public Key (Asymmetric)</span> and the <span style=\"font-style: italic; \">Private Key (Symmetric</span>) methods. While these two methods of encryption are similar in that they both allow users to encrypt data to hide it from the prying eyes of outsiders and then decrypt it for viewing by an authorized party, they differ in how they perform the steps involved in the process.\r\n<span style=\"font-weight: bold; \">Email</span> security message can rely on public-key cryptography, in which users can each publish a public key that others can use to encrypt messages to them, while keeping secret a private key they can use to decrypt such messages or to digitally encrypt and sign messages they send. \r\n<span style=\"font-weight: bold;\">Encrypted messaging systems </span>must be encrypted end-to-end, so that even the service provider and its staff are unable to decipher what’s in your communications. Ideal solutions is “server-less” encrypted chat where companies won’t store user information anywhere.\r\nIn a more general sense, users of unsecured public Wi-Fi should also consider using a <span style=\"font-weight: bold;\">Virtual Private Network </span>(VPN) application, to conceal their identity and location from Internet Service Providers (ISPs), higher level surveillance, and the attentions of hackers.","materialsDescription":"<h1 class=\"align-center\"> What is messaging security?</h1>\r\nMessaging Security is a program that provides protection for companies' messaging infrastructure. The programs include IP reputation-based anti-spam, pattern-based anti-spam, administrator-defined block/allow lists, mail antivirus, zero-hour malware detection, and email intrusion prevention.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Six Dimensions of Comprehensive Messaging Security</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">IP-Reputation Anti-spam.</span> It checks each email connection request with a database of IP addresses to establish whether a sender is a legitimate or known spam sender and malware. If a sender is recognized it undesirable the messaging Security program drops the connection before the message is accepted.</li><li><span style=\"font-weight: bold; \">Pattern-based anti-spam</span> utilizes a proprietary algorithm to establish a fingerprint-like signature of email messages. When a message comes in, its pattern is calculated and checked against a database to determine if the message matches a known email pattern. </li><li><span style=\"font-weight: bold; \">Block/Allow List Anti-spam.</span> Administrators can create a list of IP addresses or domains that they would like to either block or allow. This method ensures that trusted sources are explicitly allowed and unwanted sources are explicitly denied access.</li><li><span style=\"font-weight: bold; \">Mail Antivirus.</span> This layer of protection blocks a wide range of known viruses and malware attacks.</li><li><span style=\"font-weight: bold; \">Zero-Hour Malware Protection.</span> By analyzing large numbers of messages, outbreaks are detected along with their corresponding messages. These message patterns are then flagged as malicious, giving information about a given attack.</li><li><span style=\"font-weight: bold; \">SmartDefense Email IPS.</span> The messaging security program utilizes SmartDefense Email IPS to stop attacks targeting the messaging infrastructure. </li></ul>\r\n<h1 class=\"align-center\">What are Signal, Wire and LINE messenger security apps like ?</h1>\r\n<p class=\"align-left\">Secure private messenger is a messaging application that emphasizes the privacy and of users using encryption and service transparency. While every modern messenger system is using different security practices (most prominently SSL/HTTPS) - the difference between secure and classic messengers is what we don’t know in the scope of implementation and approach to user data. </p>\r\n<p class=\"align-left\">Message access control and secure messengers evolved into a distinct category due to the growing awareness that communication over the internet is accessible by third parties, and reasonable concerns that the messages can be used against the users.</p>\r\n<h1 class=\"align-center\">Why secure communication is essential for business?</h1>\r\n<p class=\"align-left\">In the context of business operation, communication is a vital element of maintaining an efficient and dynamic working process. It lets you keep everything up to date and on the same page. And since many things are going on at the same time - tools like messengers are one of the many helpers that make the working day a little more manageable.</p>\r\n<p class=\"align-left\">Some of the information, like employee and customer data, proprietary information, data directly linked to business performance or future projections, may be strictly under a non-disclosure agreement. Without proper text message authentication in information security or encryption, it remains vulnerable to exposure. The chances are slim, but the possibility remains. </p>\r\n<p class=\"align-left\">And there are people interested in acquiring that sensitive information, people who like to play dirty because getting a competitive advantage is a decent motivation to go beyond the law. And when private conversations leak, especially the business-related ones - the impact is comparable with the Titanic hitting an iceberg. </p>\r\n<p class=\"align-left\">Encrypted massages in messenger prevents this from happening.</p>\r\n<p class=\"align-left\"> </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Messaging_Security.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":" According to technology research firm Gartner, secure email gateways “provide basic message transfer agent functions; inbound filtering of spam, phishing, malicious and marketing emails; and outbound data loss prevention (DLP) and email encryption.”\r\nTo put that in simpler language, a secure email gateway (also called an email security gateway) is a cybersecurity solution that monitors incoming and outgoing messages for suspicious behavior, preventing them from being delivered. Secure email gateways can be deployed via an email server, public cloud, on-premises software, or in a hybrid system. According to cybersecurity experts, none of these deployment options are inherently superior; each one has its own strengths and weaknesses that must be assessed by the individual enterprise.\r\nGartner defines the secure email gateway market as mature, with the key capabilities clearly defined by market demands and customer satisfaction. These capabilities include:\r\n<ul><li>Basic and Next-Gen Anti-Phishing and Anti-Spam</li><li>Additional Security Features</li><li>Customization of the Solution’s Management Features</li><li>Low False Positive and False Negative Percentages</li><li>External Processes and Storage</li></ul>\r\nSecure email gateways are designed to surpass the traditional detection capabilities of legacy antivirus and anti-phishing solutions. To do so, they offer more sophisticated detection and prevention capabilities; secure email gateways can make use of threat intelligence to stay up-to-date with the latest threats.\r\nAdditionally, SEGs can sandbox suspicious emails, observing their behavior in a safe, enclosed environment that resembles the legitimate network. Security experts can then determine if it is a legitimate threat or a false positive.\r\nSecure email gateway solutions will often offer data loss prevention and email encryption capabilities to protect outgoing communications from prying and unscrupulous eyes.\r\nMuch like SIEM or endpoint detection and response (EDR), secure email gateways can produce false positives and false negatives, although they do tend to be far less than rates found in SIEM and EDR alerts.","materialsDescription":" <span style=\"font-weight: bold;\">How Does a Secure Email Gateway Work?</span>\r\nA secure email gateway offers a robust framework of technologies that protect against these email-borne threats. It is effectively a firewall for your email and scans both outbound and inbound email for any malicious content. At a minimum, most secure gateways offer a minimum of four security features: virus and malware blocking, spam filtering, content filtering and email archiving. Let's take a look at these features in more detail:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Virus and Malware Blocking</span></span>\r\nEmails infected with viruses or malware can make up approximately 1% of all email received by an organization. For a secure email gateway to effectively prevent these emails from reaching their intended recipients and delivering their payload, it must scan every email and be constantly kept up-to-date with the latest threat patterns and characteristics.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Spam Filtering</span></span>\r\nBelieve it or not, spam filtering is where the majority of a secure email gateway's processing power is focused. Spam is blocked in a number of different ways. Basic spam filtering usually involves a prefiltering technology that blocks or quarantines any emails received from known spammers. Spam filtering can also detect patterns commonly found in spam emails, such as preferred keywords used by spammers and the inclusion of links that could take the email recipient to a malicious site if clicked. Many email clients also allow users to flag spam messages that arrive in their mailbox and to block senders.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Content Filtering</span></span>\r\nContent filtering is typically applied to an outbound email sent by users within the company. For example, you can configure your secure email gateway to prevent specific sensitive documents from being sent to an external recipient, or put a block on image files or specific keywords within them being sent through the email system.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Email Archiving</span></span>\r\nEmail services, whether they are in the cloud or on-premise, need to be managed efficiently. Storage has been a problem for email administrators for many years, and while you may have almost infinite cloud storage available, email archiving can help to manage both user mailboxes and the efficiency of your systems. Compliance is also a major concern for many companies and email archiving is a must if you need to keep emails for a certain period of time.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Secure_Email_Gateway.jpg"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":" <span style=\"font-weight: bold; \">Secure Web gateway</span> solutions protect Web-surfing PCs from infection and enforce company policies. A secure Web gateway is a solution that filters unwanted software/malware from user-initiated Web/Internet traffic and enforces corporate and regulatory policy compliance. \r\nThese gateways must, at a minimum, include URL filtering, malicious-code detection and filtering, and application controls for popular Web-based applications, such as instant messaging (IM) and Skype. Native or integrated data leak prevention is also increasingly included. Data leak prevention features are also essential. Let's take a look at some of these features in more detail:\r\n<span style=\"font-weight: bold;\">Real-Time Traffic Inspection.</span> A secure web gateway inspects web traffic in real-time, analyzing content against corporate policies and ensuring any content that is inappropriate or which contravenes company policy is blocked. The majority of secure web gateways allow administrators to enforce common security policy templates straight off the shelf and also configure policies that are suited to their business model or compliance requirements.\r\n<span style=\"font-weight: bold;\">Protection for Off-Grid Workers.</span> As workforces become more distributed, there is a need for security solutions to offer protection on an anywhere, anytime and any device basis. A secure web gateway allows roaming users to authenticate seamlessly and to have the same security policies applies to their devices as they would if they were in the office. The result is a protected connection no matter where they are working and total peace of mind that all internet traffic is secure.\r\n<span style=\"font-weight: bold;\">Time and Content-Based Access.</span> Whether you need to restrict access to the internet at specific times, or you wish to control access to particular web content, your secure web gateway can be configured to suit your acceptable use policy and compliance requirements. Individual users can be allocated time quotas or schedules that ensure maximum productivity or only permitted access to websites that are relevant to their job roles.\r\n<span style=\"font-weight: bold;\">Data Leak Prevention.</span> As its name suggests, data leak prevention stops your corporate data from being leaked to or stolen by a third party. From detecting common business terms such as payment card industry (PCI) number patterns and phrases or personally identifiable information, a web security gateway coupled with data leak prevention software can be a very robust line of defense from both internal and external threats.","materialsDescription":"<h1 class=\"align-center\"> Secure web gateway market</h1>\r\nThere are a variety of <span style=\"font-weight: bold;\">secure web gateway vendors</span> operating - among them Symantec, iboss, F5, Check Point Software, zScaler, Barracuda, Forcepoint, McAfee and Cisco<span style=\"font-style: italic;\">. </span>Most of these companies are now emphasizing <span style=\"font-weight: bold;\">cloud web gateway</span>. Although many still carry, maintain and market their on-premises versions, the competitive battleground has largely shifted to the cloud.\r\nAccording to Gartner, Symantec and Cisco are the market leaders in terms of revenue. Their efforts in this space give an indication of where the market is heading. Symantec favors proxy-based SWG appliances and services. Cisco, on the other hand, has concentrated on a hybrid of DNS and proxy capabilities. Both have acquired CASB technology and have been integrating it with their secure web gateway services. Cisco has also added DNS-based inspection into its package. This allows it to use DNS for most inspection traffic to raise performance. More involved content inspection of potentially risky websites can be done using HTTP/HTTPS proxying.\r\nCloud based secure web gateway offerings have been growing at around 30 percent per year for the last several years, according to Gartner. When coupled with growing integration with other security features, on-premises standalone secure web gateways are slowly giving way to larger cloud-based suites that incorporate gateway security. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Secure_Web_Gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":260,"title":"Generate Business Reports"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":387,"title":"Non-compliant with IT security requirements"},{"id":400,"title":"High costs"}]}},"categories":[{"id":483,"title":"Messaging Security","alias":"messaging-security","description":"<span style=\"font-weight: bold; \">Messaging security</span> is a subcategory of <span style=\"font-style: italic; \">unified threat management (UTM) </span>focused on securing and protecting an organization’s communication infrastructure. Communication channels can include email software, messaging apps, and social network IM platforms. This extra layer of security can help secure devices and block a wider range of viruses or malware attacks.\r\nMessaging security helps to ensure the confidentiality and authenticity of an organization’s communication methods. Confidentiality refers to making sure only the intended recipients are able to read the messages and authenticity refers to making sure the identity of each sender or recipient is verified.\r\nOftentimes, attackers aim to gain access to an entire network or system by infiltrating the messaging infrastructure. Implementing proper data and message security can minimize the chance of data leaks and identity theft.\r\n<span style=\"color: rgb(97, 97, 97); \">Encrypted messaging (also known as secure messaging) provides end-to-end encryption for user-to-user text messaging. Encrypted messaging prevents anyone from monitoring text conversations. Many encrypted messenger apps also offer end-to-end encryption for phone calls made using the apps, as well as for files that are sent using the apps.</span>\r\nTwo modern methods of encryption are the <span style=\"font-style: italic; \">Public Key (Asymmetric)</span> and the <span style=\"font-style: italic; \">Private Key (Symmetric</span>) methods. While these two methods of encryption are similar in that they both allow users to encrypt data to hide it from the prying eyes of outsiders and then decrypt it for viewing by an authorized party, they differ in how they perform the steps involved in the process.\r\n<span style=\"font-weight: bold; \">Email</span> security message can rely on public-key cryptography, in which users can each publish a public key that others can use to encrypt messages to them, while keeping secret a private key they can use to decrypt such messages or to digitally encrypt and sign messages they send. \r\n<span style=\"font-weight: bold;\">Encrypted messaging systems </span>must be encrypted end-to-end, so that even the service provider and its staff are unable to decipher what’s in your communications. Ideal solutions is “server-less” encrypted chat where companies won’t store user information anywhere.\r\nIn a more general sense, users of unsecured public Wi-Fi should also consider using a <span style=\"font-weight: bold;\">Virtual Private Network </span>(VPN) application, to conceal their identity and location from Internet Service Providers (ISPs), higher level surveillance, and the attentions of hackers.","materialsDescription":"<h1 class=\"align-center\"> What is messaging security?</h1>\r\nMessaging Security is a program that provides protection for companies' messaging infrastructure. The programs include IP reputation-based anti-spam, pattern-based anti-spam, administrator-defined block/allow lists, mail antivirus, zero-hour malware detection, and email intrusion prevention.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Six Dimensions of Comprehensive Messaging Security</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">IP-Reputation Anti-spam.</span> It checks each email connection request with a database of IP addresses to establish whether a sender is a legitimate or known spam sender and malware. If a sender is recognized it undesirable the messaging Security program drops the connection before the message is accepted.</li><li><span style=\"font-weight: bold; \">Pattern-based anti-spam</span> utilizes a proprietary algorithm to establish a fingerprint-like signature of email messages. When a message comes in, its pattern is calculated and checked against a database to determine if the message matches a known email pattern. </li><li><span style=\"font-weight: bold; \">Block/Allow List Anti-spam.</span> Administrators can create a list of IP addresses or domains that they would like to either block or allow. This method ensures that trusted sources are explicitly allowed and unwanted sources are explicitly denied access.</li><li><span style=\"font-weight: bold; \">Mail Antivirus.</span> This layer of protection blocks a wide range of known viruses and malware attacks.</li><li><span style=\"font-weight: bold; \">Zero-Hour Malware Protection.</span> By analyzing large numbers of messages, outbreaks are detected along with their corresponding messages. These message patterns are then flagged as malicious, giving information about a given attack.</li><li><span style=\"font-weight: bold; \">SmartDefense Email IPS.</span> The messaging security program utilizes SmartDefense Email IPS to stop attacks targeting the messaging infrastructure. </li></ul>\r\n<h1 class=\"align-center\">What are Signal, Wire and LINE messenger security apps like ?</h1>\r\n<p class=\"align-left\">Secure private messenger is a messaging application that emphasizes the privacy and of users using encryption and service transparency. While every modern messenger system is using different security practices (most prominently SSL/HTTPS) - the difference between secure and classic messengers is what we don’t know in the scope of implementation and approach to user data. </p>\r\n<p class=\"align-left\">Message access control and secure messengers evolved into a distinct category due to the growing awareness that communication over the internet is accessible by third parties, and reasonable concerns that the messages can be used against the users.</p>\r\n<h1 class=\"align-center\">Why secure communication is essential for business?</h1>\r\n<p class=\"align-left\">In the context of business operation, communication is a vital element of maintaining an efficient and dynamic working process. It lets you keep everything up to date and on the same page. And since many things are going on at the same time - tools like messengers are one of the many helpers that make the working day a little more manageable.</p>\r\n<p class=\"align-left\">Some of the information, like employee and customer data, proprietary information, data directly linked to business performance or future projections, may be strictly under a non-disclosure agreement. Without proper text message authentication in information security or encryption, it remains vulnerable to exposure. The chances are slim, but the possibility remains. </p>\r\n<p class=\"align-left\">And there are people interested in acquiring that sensitive information, people who like to play dirty because getting a competitive advantage is a decent motivation to go beyond the law. And when private conversations leak, especially the business-related ones - the impact is comparable with the Titanic hitting an iceberg. </p>\r\n<p class=\"align-left\">Encrypted massages in messenger prevents this from happening.</p>\r\n<p class=\"align-left\"> </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Messaging_Security.png"},{"id":469,"title":"Secure E-mail Gateway","alias":"secure-e-mail-gateway","description":" According to technology research firm Gartner, secure email gateways “provide basic message transfer agent functions; inbound filtering of spam, phishing, malicious and marketing emails; and outbound data loss prevention (DLP) and email encryption.”\r\nTo put that in simpler language, a secure email gateway (also called an email security gateway) is a cybersecurity solution that monitors incoming and outgoing messages for suspicious behavior, preventing them from being delivered. Secure email gateways can be deployed via an email server, public cloud, on-premises software, or in a hybrid system. According to cybersecurity experts, none of these deployment options are inherently superior; each one has its own strengths and weaknesses that must be assessed by the individual enterprise.\r\nGartner defines the secure email gateway market as mature, with the key capabilities clearly defined by market demands and customer satisfaction. These capabilities include:\r\n<ul><li>Basic and Next-Gen Anti-Phishing and Anti-Spam</li><li>Additional Security Features</li><li>Customization of the Solution’s Management Features</li><li>Low False Positive and False Negative Percentages</li><li>External Processes and Storage</li></ul>\r\nSecure email gateways are designed to surpass the traditional detection capabilities of legacy antivirus and anti-phishing solutions. To do so, they offer more sophisticated detection and prevention capabilities; secure email gateways can make use of threat intelligence to stay up-to-date with the latest threats.\r\nAdditionally, SEGs can sandbox suspicious emails, observing their behavior in a safe, enclosed environment that resembles the legitimate network. Security experts can then determine if it is a legitimate threat or a false positive.\r\nSecure email gateway solutions will often offer data loss prevention and email encryption capabilities to protect outgoing communications from prying and unscrupulous eyes.\r\nMuch like SIEM or endpoint detection and response (EDR), secure email gateways can produce false positives and false negatives, although they do tend to be far less than rates found in SIEM and EDR alerts.","materialsDescription":" <span style=\"font-weight: bold;\">How Does a Secure Email Gateway Work?</span>\r\nA secure email gateway offers a robust framework of technologies that protect against these email-borne threats. It is effectively a firewall for your email and scans both outbound and inbound email for any malicious content. At a minimum, most secure gateways offer a minimum of four security features: virus and malware blocking, spam filtering, content filtering and email archiving. Let's take a look at these features in more detail:\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Virus and Malware Blocking</span></span>\r\nEmails infected with viruses or malware can make up approximately 1% of all email received by an organization. For a secure email gateway to effectively prevent these emails from reaching their intended recipients and delivering their payload, it must scan every email and be constantly kept up-to-date with the latest threat patterns and characteristics.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Spam Filtering</span></span>\r\nBelieve it or not, spam filtering is where the majority of a secure email gateway's processing power is focused. Spam is blocked in a number of different ways. Basic spam filtering usually involves a prefiltering technology that blocks or quarantines any emails received from known spammers. Spam filtering can also detect patterns commonly found in spam emails, such as preferred keywords used by spammers and the inclusion of links that could take the email recipient to a malicious site if clicked. Many email clients also allow users to flag spam messages that arrive in their mailbox and to block senders.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Content Filtering</span></span>\r\nContent filtering is typically applied to an outbound email sent by users within the company. For example, you can configure your secure email gateway to prevent specific sensitive documents from being sent to an external recipient, or put a block on image files or specific keywords within them being sent through the email system.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Email Archiving</span></span>\r\nEmail services, whether they are in the cloud or on-premise, need to be managed efficiently. Storage has been a problem for email administrators for many years, and while you may have almost infinite cloud storage available, email archiving can help to manage both user mailboxes and the efficiency of your systems. Compliance is also a major concern for many companies and email archiving is a must if you need to keep emails for a certain period of time.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Secure_Email_Gateway.jpg"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":" <span style=\"font-weight: bold; \">Secure Web gateway</span> solutions protect Web-surfing PCs from infection and enforce company policies. A secure Web gateway is a solution that filters unwanted software/malware from user-initiated Web/Internet traffic and enforces corporate and regulatory policy compliance. \r\nThese gateways must, at a minimum, include URL filtering, malicious-code detection and filtering, and application controls for popular Web-based applications, such as instant messaging (IM) and Skype. Native or integrated data leak prevention is also increasingly included. Data leak prevention features are also essential. Let's take a look at some of these features in more detail:\r\n<span style=\"font-weight: bold;\">Real-Time Traffic Inspection.</span> A secure web gateway inspects web traffic in real-time, analyzing content against corporate policies and ensuring any content that is inappropriate or which contravenes company policy is blocked. The majority of secure web gateways allow administrators to enforce common security policy templates straight off the shelf and also configure policies that are suited to their business model or compliance requirements.\r\n<span style=\"font-weight: bold;\">Protection for Off-Grid Workers.</span> As workforces become more distributed, there is a need for security solutions to offer protection on an anywhere, anytime and any device basis. A secure web gateway allows roaming users to authenticate seamlessly and to have the same security policies applies to their devices as they would if they were in the office. The result is a protected connection no matter where they are working and total peace of mind that all internet traffic is secure.\r\n<span style=\"font-weight: bold;\">Time and Content-Based Access.</span> Whether you need to restrict access to the internet at specific times, or you wish to control access to particular web content, your secure web gateway can be configured to suit your acceptable use policy and compliance requirements. Individual users can be allocated time quotas or schedules that ensure maximum productivity or only permitted access to websites that are relevant to their job roles.\r\n<span style=\"font-weight: bold;\">Data Leak Prevention.</span> As its name suggests, data leak prevention stops your corporate data from being leaked to or stolen by a third party. From detecting common business terms such as payment card industry (PCI) number patterns and phrases or personally identifiable information, a web security gateway coupled with data leak prevention software can be a very robust line of defense from both internal and external threats.","materialsDescription":"<h1 class=\"align-center\"> Secure web gateway market</h1>\r\nThere are a variety of <span style=\"font-weight: bold;\">secure web gateway vendors</span> operating - among them Symantec, iboss, F5, Check Point Software, zScaler, Barracuda, Forcepoint, McAfee and Cisco<span style=\"font-style: italic;\">. </span>Most of these companies are now emphasizing <span style=\"font-weight: bold;\">cloud web gateway</span>. Although many still carry, maintain and market their on-premises versions, the competitive battleground has largely shifted to the cloud.\r\nAccording to Gartner, Symantec and Cisco are the market leaders in terms of revenue. Their efforts in this space give an indication of where the market is heading. Symantec favors proxy-based SWG appliances and services. Cisco, on the other hand, has concentrated on a hybrid of DNS and proxy capabilities. Both have acquired CASB technology and have been integrating it with their secure web gateway services. Cisco has also added DNS-based inspection into its package. This allows it to use DNS for most inspection traffic to raise performance. More involved content inspection of potentially risky websites can be done using HTTP/HTTPS proxying.\r\nCloud based secure web gateway offerings have been growing at around 30 percent per year for the last several years, according to Gartner. When coupled with growing integration with other security features, on-premises standalone secure web gateways are slowly giving way to larger cloud-based suites that incorporate gateway security. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Secure_Web_Gateway.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://assets.barracuda.com/assets/docs/dms/Barracuda_Email_Protection_CS_Cape_Air_US.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":658,"title":"Barracuda Web Security Gateway for global manufacturer","description":"Challenges\r\n<ul><li>Suffered Cryptolocker ransomware attack</li><li>Business-critical data encrypted</li><li>Risk of significant cost, lost business, and damaged corporate reputation</li></ul>\r\nResults\r\n<ul><li>Encrypted files identified and deleted</li><li>Affected files restored from backup</li><li>No ransom paid</li><li>Up and running again in one hour</li></ul>\r\nThe company’s three Barracuda Backup appliances are themselves backed up with Barracuda Cloud subscriptions, replicating local backups to Barracuda’s enterprise-grade datacenters for disaster recovery. \r\n<blockquote>“The Barracuda Cloud subscriptions give us extra peace of mind. Even if our on-site backups are somehow compromised or destroyed, our data will be completely secure and easy to restore,” says Murray.</blockquote>\r\nMurray’s appreciation for Barracuda products goes beyond Backup. He and his team also use Barracuda Web Security Gateway to secure web traffic and monitor web usage by Hayward Tyler’s users. \r\n<blockquote>“We had a SonicWall UTM product that we felt wasn’t performing as we had hoped. Since replacing it with the Barracuda Web Security Gateway, we’ve seen a marked improvement. It’s very powerful, but it’s also very easy to configure and manage.”</blockquote>\r\nHayward Tyler Group PLC has built its reputation over 200 years by delivering products and solutions that fulfill critical functions reliably and effectively in demanding, dynamic environments. Allowing that reputation to be put at risk by a ransomware attack is simply unacceptable. To protect the company’s reputation, data, business, and personnel, A.J. Murray relies on Barracuda Backup and Barracuda Web Security Gateway.","alias":"barracuda-web-security-gateway-for-global-manufacturer","roi":0,"seo":{"title":"Barracuda Web Security Gateway for global manufacturer","keywords":"","description":"Challenges\r\n<ul><li>Suffered Cryptolocker ransomware attack</li><li>Business-critical data encrypted</li><li>Risk of significant cost, lost business, and damaged corporate reputation</li></ul>\r\nResults\r\n<ul><li>Encrypted files identified and deleted</li><li>Af","og:title":"Barracuda Web Security Gateway for global manufacturer","og:description":"Challenges\r\n<ul><li>Suffered Cryptolocker ransomware attack</li><li>Business-critical data encrypted</li><li>Risk of significant cost, lost business, and damaged corporate reputation</li></ul>\r\nResults\r\n<ul><li>Encrypted files identified and deleted</li><li>Af"},"deal_info":"","user":{"id":5061,"title":"Hayward Tyler","logoURL":"https://old.roi4cio.com/uploads/roi/company/Hayward_Tyler.jpg","alias":"hayward-tyler","address":"","roles":[],"description":"Hayward Tyler designs, manufactures, and services fluid-filled electric motors and pumps for high-pressure, high-temperature applications and environments across the global energy sector. ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://haywardtyler.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hayward Tyler","keywords":"","description":"Hayward Tyler designs, manufactures, and services fluid-filled electric motors and pumps for high-pressure, high-temperature applications and environments across the global energy sector. ","og:title":"Hayward Tyler","og:description":"Hayward Tyler designs, manufactures, and services fluid-filled electric motors and pumps for high-pressure, high-temperature applications and environments across the global energy sector. ","og:image":"https://old.roi4cio.com/uploads/roi/company/Hayward_Tyler.jpg"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":183,"title":"Barracuda Networks","logoURL":"https://old.roi4cio.com/uploads/roi/company/barracuda_logo.png","alias":"barracuda-networks","address":"","roles":[],"description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and storage based on network devices and cloud services. Security products include solutions to protect against spam, web surfing, hackers and threats from instant messaging services. The platform also successfully combats such threats as spam, spyware, Trojans and other malware. Barracuda solutions provide web traffic filtering, load balancing, message archiving, backup services, data protection, and more.<br /><br />Today, more than 50,000 companies and security organizations around the world use Barracuda Networks solutions. The main product list includes solutions such as Barracuda Spam Firewall, Barracuda Web Filter, Barracuda IM Firewall. ","companyTypes":[],"products":{},"vendoredProductsCount":11,"suppliedProductsCount":11,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":15,"vendorPartnersCount":0,"supplierPartnersCount":3,"b4r":1,"categories":{},"companyUrl":"www.barracuda.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Barracuda Networks","keywords":"products, company, Barracuda, include, protection, services, storage, security","description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and stor","og:title":"Barracuda Networks","og:description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and stor","og:image":"https://old.roi4cio.com/uploads/roi/company/barracuda_logo.png"},"eventUrl":""}],"products":[{"id":1198,"logo":false,"scheme":false,"title":"Barracuda Web Security Gateway","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"barracuda-web-security-gateway","companyTypes":[],"description":"Barracuda Web Security Gateway - easily and completely blocks spyware and other types of malware from the computers of employees of the organization without loss of performance. Barracuda Networks Barracuda Web Security Gateway is a powerful integrated content protection and analysis solution that is applicable to all business categories. Barracuda Web Security Gateway is very easy to install, has an intuitive management and monitoring interface and is automatically updated every hour through the Barracuda Central website. To install the solution, no additional software is needed, network settings are changed, and there is no need to purchase licenses for each additional user when the system is expanded. Barracuda Web Security Gateway combines proactive, reactive and proactive protection measures, ensuring complete network security: Prevent spyware downloads. Preventing viruses loading. Blocking access to Web sites with spyware. Determining the access of spyware to the Internet. Complete removal of spyware. Blocking malicious Web sites.","shortDescription":"Barracuda Web Security Gateway protect users from malware and saves bandwidth","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Web Security Gateway","keywords":"Barracuda, Gateway, spyware, Security, network, additional, solution, protection","description":"Barracuda Web Security Gateway - easily and completely blocks spyware and other types of malware from the computers of employees of the organization without loss of performance. Barracuda Networks Barracuda Web Security Gateway is a powerful integrated content","og:title":"Barracuda Web Security Gateway","og:description":"Barracuda Web Security Gateway - easily and completely blocks spyware and other types of malware from the computers of employees of the organization without loss of performance. Barracuda Networks Barracuda Web Security Gateway is a powerful integrated content"},"eventUrl":"","translationId":1390,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":548,"title":"Web security - Appliance","alias":"web-security-appliance","description":"A security appliance is any form of server appliance that is designed to protect computer networks from unwanted traffic. Types of network security appliance:\r\n<span style=\"font-weight: bold;\">Active devices</span> block unwanted traffic. Examples of such devices are firewalls, anti-virus scanning devices, and content filtering devices. For instance, if you want to make sure that you do not get pointless spam and other unnecessary issues, installing an active device might be a great idea. Active devices include anti-virus scanning devices, which will automatically scan throughout the network to ensure that no virus exists within the protected network. Then, there are web filtering appliances as well as firewalls, the purpose of both of which is to ensure that only useful content and traffic flows through the network and all pointless or harmful data is filtered.\r\n<span style=\"font-weight: bold;\">Passive devices detect and report on unwanted traffic.</span> A common example is intrusion detection appliances, which are installed in order to determine whether the network has been compromised in any way. These devices usually work in the background at all times.\r\n<span style=\"font-weight: bold;\">Preventative devices</span> scan networks and identify potential security problems (such as penetration testing and vulnerability assessment appliances). These devices are usually designed to 'prevent' damage to the network by identifying problems in advance. Common examples include devices that employ penetration testing as well as those devices which carry out vulnerability assessment on networks.\r\n<span style=\"font-weight: bold;\">Unified Threat Management (UTM)</span> combines features together into one system, such as some firewalls, content filtering, web caching etc. UTM devices are designed to provide users with a one-stop solution to all of their network needs and internet security appliances. As the name clearly suggests, these devices provide the features of all of the other network devices and condense them into one. These devices are designed to provide a number of different network security options in one package, hence providing networks with a simple solution. Rather than installing four different devices, users can easily install one and be done with it. The market of UTM devices has exceeded the billion dollar mark already, which just goes to show how popular these devices have become amongst network users.\r\nOne of the most popular and accessible types of web security appliance tools is the hardware <span style=\"font-weight: bold;\">keylogger.</span> This device is placed covertly between the case and keyboard with an output for the computer case and input for the keyboard. As hardware standards have changed over time, a USB hardware keylogger provides access on many devices.\r\nThe <span style=\"font-weight: bold;\">web proxy appliance</span> is basically hardware you use to manage user web access. More to the point, it's the type of device that handles the blocking or controlling of suspicious programs. It's typically placed in between network users and the worldwide web; ergo, it's most popular application is serving as a central control hub over employee Internet use by corporations and enterprises. It's the in-between gateway that serves as a termination point of sorts for online communications within a network and is capable of applying a multitude of rule-based limitations on Internet traffic, web content, and requests before they even end up with end users.\r\nAnother commonly used hardware tool is the <span style=\"font-weight: bold;\">wireless antenna.</span> These can be used to surveil a wide variety of wireless communications, including local cellular and internet service networks. More mechanical and general devices may include lockpicks or portable probes and hijack chips for compromising electronic devices through the physical circuit.\r\n<span style=\"font-weight: bold;\">Secure web gateway appliances</span> are solutions to prevent advanced threats, block unauthorized access to systems or websites, stop malware, and monitor real-time activity across websites accessed by users within the institution. Software and cloud-based platforms now perform this function as well.","materialsDescription":"<h1 class=\"align-center\"> What are the top Network Security Appliance brands?</h1>\r\n<span style=\"font-weight: bold;\">Blue Coat Systems,</span> Sunnyvale, Calif.-based Blue Coat has been part of security powerhouse Symantec since 2016.\r\n<span style=\"font-weight: bold;\">F5 Networks,</span> the Seattle-based network application delivery vendor, sold about $17.6 million in network security appliances through the channel in the second quarter, NPD said.\r\n<span style=\"font-weight: bold;\">SonicWall.</span>Firewall power player SonicWall sold about $23.5 million in network security appliances through the channel in the second quarter, according to NPD.\r\n<span style=\"font-weight: bold;\">Fortinet,</span> Sunnyvale, Calif., security software vendor Fortinet sold about $24.4 million in network security appliances through the channel in the second quarter, NPD said.\r\n<span style=\"font-weight: bold;\">Cisco Systems,</span> Cisco Systems was the quarter's growth champion, posting $77.2 million in network security appliance sales through the channel in the period, beating the previous year’s quarterly total of $62.3 million by about 24 percent, according to NPD.\r\n<span style=\"font-weight: bold;\">Palo Alto Networks.</span> With $94.2 million in network security appliance sales in the quarter, Palo Alto Networks was the best-selling network security appliance brand of the second quarter, according to NPD.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_security_Appliance.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":" <span style=\"font-weight: bold; \">A web filter appliance</span> is a device that allows the user to filter all online content for censorship purposes, such that any links, downloads, and email containing offensive materials or pornography is outright blocked or removed. Web filtering appliance can also help you prevent malware infection because, more often than not, malware is usually hidden within links that promise porn or controversial content. Moreover, because the number of online hazards is un stopped increasing every day, it's always prudent to get a web filter appliance that can adapt to the changing times and the ever-evolving hazards posed by the Internet.\r\nAt any rate, content filtering appliance has a distinct advantage over their software counterparts in terms of stable restriction features, unrestricted monitoring, no platform-based limitations, easy upgrades and improvements, and so on. That's because the best web filters are fully integrated software and hardware systems that optimize their hybrid attributes when it comes to content filtering by gaining full, unmitigated control over online usage through well-defined policies as mandated by the owner of the network or the IT security administrator.\r\nGetting a web content filtering appliance that has a list of premium-grade and detailed content analysis with predefined categories (which includes keywords for pornography, game downloads, drugs, violence, adult content, offensive content, racist content, controversial content, and the like) is a must for any major network. All of the items you'll ever need to block should be easily selectable with a click of your mouse as well; after all, sophisticated technology aside, a good web filter appliance should also be intuitive and practical to use as well.<br /> ","materialsDescription":"<h1 class=\"align-center\">How a Web Content Filter Appliance Works</h1>\r\n<p class=\"align-left\">Typically a web content filter appliance protects Internet users and networks by using a combination of blacklists, URIBL and SURBL filters, category filters and keyword filters. Blacklists, URIBL and SURBL filters work together to prevent users visiting websites known to harbor malware, those that have been identified as fake phishing sites, and those who hid their true identity by using the whois privacy feature or a proxy server. Genuine websites have no reason to hide their true identity.</p>\r\n<p class=\"align-left\">In the category filtering process, the content of millions of webpages are analyzed and assigned a category. System administrators can then choose which categories to block access to (i.e. online shopping, alcohol, pornography, gambling, etc.) depending on whether the web content filter appliance is providing a service to a business, a store, a school, a restaurant, or a workplace. Most appliances for filtering web content also offer the facility to create bespoke categories.</p>\r\n<p class=\"align-left\">Keyword filters have multiple uses. They can be used to block access to websites containing specific words (for example the business name of a competitor), specific file extensions (typically those most commonly used for deploying malware and ransomware), and specific web applications; if, for example, a business wanted to allow its marketing department access to Facebook, but not FaceTime. Effectively, the keyword filters fine-tune the category settings, enhance security and increase productivity.</p>\r\n<h1 class=\"align-center\">Are there any home web filter appliance?</h1>\r\nFor children today, the Internet has always existed. To them, it’s second nature to pop online and watch a funny video, find a fact, or chat with a friend. But, of course, the Internet is also filled with a lot of dark corners (It’s a hop, skip, and a click to adult content). Parents, then, are presented with the daunting task of not only monitoring what sites their children visit but also their screen time consumption. There are a number of home content filtering appliance that allow parents to do just this. The best parental control apps and devices, be they hardware or software, not only put parents in command of such things as the content their children can view and the amount of time they can spend online but help restore a parent’s sense of control. With them, parents, from can restrict access to only specific sites and apps, filter dangerous or explicit web-content, manage time, and even track their location.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_filtering_Appliance.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"Secure web gateways are generally appliance-based security solutions that prevent advanced threats, block unauthorized access to systems or websites, stop malware, and monitor real-time activity across websites accessed by users within the institution.\r\nA secure web gateway is primarily used to monitor and prevent malicious traffic and data from entering, or even leaving, an organization’s network. Typically, it is implemented to secure an organization against threats originating from the Internet, websites and other Web 2.0 products/services. It is generally implemented through a hardware gateway device implemented at the outer boundaries of a network. Some of the features a secure Web gateway provides include URL filtering, application-level control, data leakage prevention, and virus/malware code detection.\r\nA Secure web gateway (SWG) protects users against phishing, malware and other Internet-borne threats. Unlike traditional firewalls, SWGs are focused on layer 7 web traffic inspection, both inbound and outbound. As web security solutions, they apply no protection to WAN traffic, which is left to the corporate next generation firewalls. In recent years, SWGs appeared as a cloud service. The cloud instances enable secure web and cloud access from anywhere – including outside the office by mobile users. The traffic coverage and solution form factor remain the key distinctions between SWGs and next generation firewalls, which often provide a very similar level of security capabilities.\r\nA converged, cloud-based network security solution converges the capabilities of a next generation firewall (WAN and Internet traffic inspection) and the extended coverage for mobile users of SWGs.\r\nA converged approach eliminates the need to maintain policies across multiple point solutions and the appliance life cycle.","materialsDescription":"<span style=\"font-weight: bold;\">Why is a secure web gateway important?</span>\r\nSecure web gateways have become increasingly common as cybercriminals have grown more sophisticated in embedding threat vectors into seemingly innocuous or professional-looking websites. These counterfeit websites can compromise the enterprise as users access them, unleashing malicious code and unauthorized access in the background without the user's knowledge. These fake, criminal websites can be quite convincing.\r\nSome of these scam websites appear to be so authentic that they can convince users to enter credit card numbers and personal identification information (PII) such as social security numbers. Other sites require only the connection to the user to bypass web browser controls and inject malicious code such as viruses or malware into the user's network. Examples include fake online shopping sites posing as brand-name sellers, sites that appear to be legitimate government agencies and even business-to-business intranets. Secure web gateways can also prevent data from flowing out of an organization, making certain that restricted data is blocked from leaving the organization.\r\n<span style=\"font-weight: bold;\">How does a secure web gateway work?</span>\r\nSecure web gateways are installed as a software component or a hardware device on the edge of the network or at user endpoints. All traffic to and from users to other networks must pass through the gateway that monitors it. The gateway monitors this traffic for malicious code, web application use, and all user/non-user attempted URL connections.\r\nThe gateway checks or filters website URL addresses against stored lists of known and approved websites—all others not on the approved lists can be explicitly blocked. Known malicious sites can be explicitly blocked as well. URL filters that maintain allowed web addresses are maintained in whitelists, while known, off-limits sites that are explicitly blocked are maintained in blacklists. In enterprises, these lists are maintained in the secure gateway's database, which then applies the list filters to all incoming and outgoing traffic.\r\nSimilarly, data flowing out of the network can be checked, disallowing restricted data sources—data on the network or user devices that are prohibited from distribution. Application-level controls can also be restricted to known and approved functions, such as blocking uploads to software-as-a-service (SaaS) applications (such as Office 365 and Salesforce.com). Although some enterprises deploy secure web gateways in hardware appliances that filter all incoming and outgoing traffic, many organizations use cloud-based, SaaS secure web gateways as a more flexible and less costly solution to deploy and maintain. Organizations with existing hardware investments often combine the two, using hardware at their larger physical sites and cloud-based gateways for remote locations and traveling workers.\r\n<span style=\"font-weight: bold;\">What are some features of secure web gateways?</span>\r\nBeyond basic URL, web application control and data filtering, secure web gateways should provide additional controls and features that enhance network security.\r\n<ul><li>Encrypted traffic analysis. The gateway should compare all traffic to local and global threat lists and reputation sources first, then also analyze the nature of the traffic itself to determine if any content or code poses a threat to the network. This should include SSL-based encrypted traffic.</li><li>Data Loss Prevention. If, for example, a website accepts uploaded documents or data, the documents should first be scanned for sensitive data before being uploaded.</li><li>Social media protection. All information to and from social media should be scanned and filtered.</li><li>Support for all protocols. HTTP, HTTPS, and FTP internet protocols must be supported. While HTTPS is the industry standard now, many sites still support HTTP and FTP connections.</li><li>Integration with zero-day anti-malware solutions. Threats will be discovered, and integration with anti-malware solutions that can detect zero-day (never seen before) threats deliver the best prevention and remediation.</li><li>Integration with security monitoring. Security administrators should be notified of any web gateway security problems via their monitoring solution of choice, typically a security information and event management (SIEM) solution.</li><li>Choice of location. Choose where your secure web gateway best fits in your network—the edge, at endpoints, or in the cloud.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Secure_Web_Gateway_Appliance.png"},{"id":485,"title":"Web security","alias":"web-security","description":" Web security basically means protecting a website or web application by detecting, preventing and responding to cyber threats.\r\nWebsites and web applications are just as prone to security breaches as physical homes, stores, and government locations. Unfortunately, cybercrime happens every day, and great web security measures are needed to protect websites and web applications from becoming compromised.\r\nThat’s exactly what web security does – it is a system of protection measures and protocols that can protect your website or web application from being hacked or entered by unauthorized personnel. This integral division of Information Security is vital to the protection of websites, web applications, and web services. Anything that is applied over the Internet should have some form of web security to protect it.\r\nThere are a lot of factors that go into web security and web protection. Any website or application that is secure is surely backed by different types of checkpoints and techniques for keeping it safe.\r\nThere are a variety of security standards that must be followed at all times, and these standards are implemented and highlighted by the OWASP. Most experienced web developers from top cybersecurity companies will follow the standards of the OWASP as well as keep a close eye on the Web Hacking Incident Database to see when, how, and why different people are hacking different websites and services.\r\nEssential steps in protecting web apps from attacks include applying up-to-date encryption, setting proper authentication, continuously patching discovered vulnerabilities, avoiding data theft by having secure software development practices. The reality is that clever attackers may be competent enough to find flaws even in a fairly robust secured environment, and so a holistic security strategy is advised.\r\nThere are different types of technologies available for maintaining the best security standards. Some popular technical solutions for testing, building, and preventing threats include black and white box testing tools, fuzzing tools, WAF, security or vulnerability scanners, password cracking tools, and so on.","materialsDescription":" <span style=\"font-weight: bold; \">What is Malware?</span>\r\nThe name malware is short for ‘malicioussoftware’. Malware includes any software program that has been created to perform an unauthorised — and often harmful — action on a user’s device. Examples of malware include:\r\n<ul><li>Computer viruses</li><li>Word and Excel macro viruses</li><li>Boot sector viruses</li><li>Script viruses — including batch, Windows shell, Java and others</li><li>Keyloggers</li><li>Password stealers</li><li>Backdoor Trojan viruses</li><li>Other Trojan viruses</li><li>Crimeware</li><li>Spyware</li><li>Adware... and many other types of malicious software programs</li></ul>\r\n<span style=\"font-weight: bold; \">What is the difference between a computer virus and a worm?</span>\r\n<span style=\"font-weight: bold; \">Computer virus.</span> This is a type of malicious program that can replicate itself — so that it can spread from file to file on a computer, and can also spread from one computer to another. Computer viruses are often programmed to perform damaging actions — such as corrupting or deleting data. The longer a virus remains undetected on your machine, the greater the number of infected files that may be on your computer.\r\n<span style=\"font-weight: bold; \">Worms.</span> Worms are generally considered to be a subset of computer viruses — but with some specific differences:\r\n<ul><li>A worm is a computer program that replicates, but does not infect other files.</li><li>The worm will install itself once on a computer — and then look for a way to spread to other computers.</li><li>Whereas a virus is a set of code that adds itself to existing files, a worm exists as a separate, standalone file.</li></ul>\r\n<span style=\"font-weight: bold; \">What is a Trojan virus?</span>\r\nA Trojan is effectively a program that pretends to be legitimate software — but, when launched, it will perform a harmful action. Unlike computer viruses and worms, Trojans cannot spread by themselves. Typically, Trojans are installed secretly and they deliver their malicious payload without the user’s knowledge.\r\nCybercriminals use many different types of Trojans — and each has been designed to perform a specific malicious function. The most common are:\r\n<ul><li>Backdoor Trojans (these often include a keylogger)</li><li>Trojan Spies</li><li>Password stealing Trojans</li><li>Trojan Proxies — that convert your computer into a spam distribution machine</li></ul>\r\n<span style=\"font-weight: bold; \">Why are Trojan viruses called Trojans?</span>\r\nIn Greek mythology — during the Trojan war — the Greeks used subterfuge to enter the city of Troy. The Greeks constructed a massive wooden horse — and, unaware that the horse contained Greek soldiers, the Trojans pulled the horse into the city. At night, the Greek soldiers escaped from the horse and opened the city gates — for the Greek army to enter Troy.\r\nToday, Trojan viruses use subterfuge to enter unsuspecting users’ computers and devices.\r\n<span style=\"font-weight: bold; \">What is a Keylogger?</span>\r\nA keylogger is a program that can record what you type on your computer keyboard. Criminals use keyloggers to obtain confidential data — such as login details, passwords, credit card numbers, PINs and other items. Backdoor Trojans typically include an integrated keylogger.\r\n<span style=\"font-weight: bold; \">What is Phishing?</span>\r\nPhishing is a very specific type of cybercrime that is designed to trick you into disclosing valuable information — such as details about your bank account or credit cards. Often, cybercriminals will create a fake website that looks just like a legitimate site — such as a bank’s official website. The cybercriminal will try to trick you into visiting their fake site — typically by sending you an email that contains a hyperlink to the fake site. When you visit the fake website, it will generally ask you to type in confidential data — such as your login, password or PIN.\r\n<span style=\"font-weight: bold; \">What is Spyware?</span>\r\nSpyware is software that is designed to collect your data and send it to a third party — without your knowledge or consent. Spyware programs will often:\r\n<ul><li>Monitor the keys you press on your keyboard — using a keylogger</li><li>Collect confidential information — such as your passwords, credit card numbers, PIN numbers and more</li><li>Gather — or ‘harvest’ — email addresses from your computer</li><li>Track your Internet browsing habits</li></ul>\r\n<span style=\"font-weight: bold; \">What is a Rootkit?</span>\r\nRootkits are programs that hackers use in order to evade detection while trying to gain unauthorised access to a computer. Rootkits have been used increasingly as a form of stealth to hide Trojan virus activity. When installed on a computer, rootkits are invisible to the user and also take steps to avoid being detected by security software.\r\nThe fact that many people log into their computers with administrator rights — rather than creating a separate account with restricted access — makes it easier for cybercriminals to install a rootkit.\r\n<span style=\"font-weight: bold; \">What is a Botnet?</span>\r\nA botnet is a network of computers controlled by cybercriminals using a Trojan virus or other malicious program.\r\n<span style=\"font-weight: bold;\">What is a DDoS attack?</span>\r\nA Distributed-Denial-of-Service (DDoS) attack is similar to a DoS. However, a DDoS attack is conducted using multiple machines. Usually, for a DDoS attack, the hacker will use one security compromised computer as the ‘master’ machine that co-ordinates the attack by other ‘zombie machines’. Typically, the cybercriminal will compromise the security on the master and all of the zombie machines, by exploiting a vulnerability in an application on each computer — to install a Trojan or other piece of malicious code.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/security-web-application-security.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":" <span style=\"font-weight: bold; \">Web filtering</span> is a technology that stops users from viewing certain URLs or websites by preventing their browsers from loading pages from these sites. Web filters are made in different ways and deliver various solutions for individual, family, institutional or enterprise use.\r\nIn general, Web filters work in two distinct ways. They can <span style=\"font-weight: bold; \">block content</span> as determined by quality of the site, by consulting known lists which document and categorize popular pages across all genres of content. Or, they can <span style=\"font-weight: bold; \">evaluate the content</span> of the page live and block it accordingly. Many Web filter tools work off of a constantly updated URL database that shows which websites and domains are associated with hosting malware, phishing, viruses or other tools for harmful activities.\r\n<span style=\"font-weight: bold;\">Web Filtering Types.</span> <span style=\"font-style: italic;\">Blacklist & Whitelist Filters:</span>when using blacklists, an administrator (which might be a parent) manually enters all websites that are deemed inappropriate into the program, and those sites are subsequently blocked. Whitelists are used in exactly the same way, only in reverse – i.e. URLs are manually entered onto a whitelist, and all other websites are then off-limits.\r\n<span style=\"font-style: italic; \">Keyword And Content Filters: </span>this type of filtering is in many ways similar to black and whitelist filtering, though with a slightly broader scope. Keyword and content filters will filter out websites that contain specific keywords or predefined content (such as pornography, for example).\r\nSome website filtering software also provides reporting so that the installer can see what kind of traffic is being filtered and who has requested it. Some products provide soft blocking (in which a warning page is sent to the user instead of the requested page while still allowing access to the page) and an override capability that allows an administrator to unlock a page. \r\n<span style=\"font-weight: bold; \">Web Filtering Software for Business.</span> Most organizations have moved to cloud based-applications, making browsers a tool that employees use on a daily basis to access work. Browsers have become a conduit to not only the cloud, but also to immeasurable malware and distractions hosted on the web. In order to ensure that browsers do not bring in malicious traffic, web filtering software becomes necessary.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">What is Enterprise Web Filtering Software?</h1>\r\nAntivirus and antimalware software are required to detect malicious programs that has been downloaded, but it is now important for enterprise web filtering software to be installed. Content filtering software is an invaluable protection against a wide range of web-borne threats. Rather than allowing malware and ransomware to be downloaded, it prevents end users from visiting websites that contain these malicious threats.\r\nInternet filtering software is also one of the most effective ways to neutralize the threat from phishing. Phishing is a technique used by cybercriminals to gain access to sensitive user information. Phishers trick end users into revealing login credentials or downloading malicious software onto their computers.\r\nPhishing involves sophisticated social engineering techniques to fool end users into visiting malicious websites. If employees can be convinced to reveal sensitive information or download ransomware or malware, cybercriminals can easily bypass even the most sophisticated of cybersecurity defenses.\r\n<h1 class=\"align-center\">What is URL Filtering?</h1>\r\nURL filtering is a type of network filtering software that helps businesses control their users’ and guests’ ability to access certain content on the web. If you’ve ever gotten a “block” page while surfing the internet at the office, then your company is using web filtering.\r\nSome employers may only be concerned about blocking access to websites that are known to spread malware or steal information. Other businesses may block content they find inappropriate, such as adult websites or sites that promote violence, or content that violates compliance regulations. They may also choose to activate web protection software to block social media or video streaming sites to minimize drains on productivity and network bandwidth.\r\nTypically, URL filtering software is provided by a cybersecurity service, firewall, or router. Each of these may use a variety of threat intelligence sources to determine which websites fit into their chosen acceptable and unacceptable categories. That’s where highly reliable web reputation services are most valuable. Sources that have extensive web histories and real-time active crawling services will provide the most accurate content determinations.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_filtering.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":" <span style=\"font-weight: bold; \">Secure Web gateway</span> solutions protect Web-surfing PCs from infection and enforce company policies. A secure Web gateway is a solution that filters unwanted software/malware from user-initiated Web/Internet traffic and enforces corporate and regulatory policy compliance. \r\nThese gateways must, at a minimum, include URL filtering, malicious-code detection and filtering, and application controls for popular Web-based applications, such as instant messaging (IM) and Skype. Native or integrated data leak prevention is also increasingly included. Data leak prevention features are also essential. Let's take a look at some of these features in more detail:\r\n<span style=\"font-weight: bold;\">Real-Time Traffic Inspection.</span> A secure web gateway inspects web traffic in real-time, analyzing content against corporate policies and ensuring any content that is inappropriate or which contravenes company policy is blocked. The majority of secure web gateways allow administrators to enforce common security policy templates straight off the shelf and also configure policies that are suited to their business model or compliance requirements.\r\n<span style=\"font-weight: bold;\">Protection for Off-Grid Workers.</span> As workforces become more distributed, there is a need for security solutions to offer protection on an anywhere, anytime and any device basis. A secure web gateway allows roaming users to authenticate seamlessly and to have the same security policies applies to their devices as they would if they were in the office. The result is a protected connection no matter where they are working and total peace of mind that all internet traffic is secure.\r\n<span style=\"font-weight: bold;\">Time and Content-Based Access.</span> Whether you need to restrict access to the internet at specific times, or you wish to control access to particular web content, your secure web gateway can be configured to suit your acceptable use policy and compliance requirements. Individual users can be allocated time quotas or schedules that ensure maximum productivity or only permitted access to websites that are relevant to their job roles.\r\n<span style=\"font-weight: bold;\">Data Leak Prevention.</span> As its name suggests, data leak prevention stops your corporate data from being leaked to or stolen by a third party. From detecting common business terms such as payment card industry (PCI) number patterns and phrases or personally identifiable information, a web security gateway coupled with data leak prevention software can be a very robust line of defense from both internal and external threats.","materialsDescription":"<h1 class=\"align-center\"> Secure web gateway market</h1>\r\nThere are a variety of <span style=\"font-weight: bold;\">secure web gateway vendors</span> operating - among them Symantec, iboss, F5, Check Point Software, zScaler, Barracuda, Forcepoint, McAfee and Cisco<span style=\"font-style: italic;\">. </span>Most of these companies are now emphasizing <span style=\"font-weight: bold;\">cloud web gateway</span>. Although many still carry, maintain and market their on-premises versions, the competitive battleground has largely shifted to the cloud.\r\nAccording to Gartner, Symantec and Cisco are the market leaders in terms of revenue. Their efforts in this space give an indication of where the market is heading. Symantec favors proxy-based SWG appliances and services. Cisco, on the other hand, has concentrated on a hybrid of DNS and proxy capabilities. Both have acquired CASB technology and have been integrating it with their secure web gateway services. Cisco has also added DNS-based inspection into its package. This allows it to use DNS for most inspection traffic to raise performance. More involved content inspection of potentially risky websites can be done using HTTP/HTTPS proxying.\r\nCloud based secure web gateway offerings have been growing at around 30 percent per year for the last several years, according to Gartner. When coupled with growing integration with other security features, on-premises standalone secure web gateways are slowly giving way to larger cloud-based suites that incorporate gateway security. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Secure_Web_Gateway.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1312,"logo":false,"scheme":false,"title":"Barracuda Backup","vendorVerified":0,"rating":"2.00","implementationsCount":2,"suppliersCount":0,"alias":"barracuda-backup","companyTypes":[],"description":"Barracuda Backup is a unified, cost-effective data protection solution for your physical, virtual, and SaaS environments. It’s a complete backup solution with remote storage that is easy to buy, install, and manage.\r\nPhysical and Virtual\r\nMost businesses today have a mixed environment of physical and virtual servers. Barracuda Backup is a single solution to protect physical servers and virtual machines (VMware & Hyper-V) with snapshot and granular file recovery—all with unified management for replication and retention.\r\nAll-in-One Backup Solution\r\nBarracuda Backup is a complete solution that comes from one vendor. It combines software, in-line deduplication, and offsite cloud or private replication without perserver or per-application licensing fees.\r\nFlexible Deployment\r\nBarracuda Backup is available as an all-inone physical appliance or a virtual appliance software offering for those wanting to leverage existing storage and compute infrastructures. Barracuda Backup can replicate data securely and efficiently from an on-premises physical or virtual backup appliance to Barracuda Cloud, a remote physical appliance, a remote virtual appliance, or Amazon Web Services (AWS).","shortDescription":"Barracuda Backup unified, cost-effective data protection solution for your physical, virtual environments. It’s a complete backup solution with remote storage that is easy to buy, install, and manage.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda Backup","keywords":"Barracuda, Backup, physical, virtual, appliance, solution, with, remote","description":"Barracuda Backup is a unified, cost-effective data protection solution for your physical, virtual, and SaaS environments. It’s a complete backup solution with remote storage that is easy to buy, install, and manage.\r\nPhysical and Virtual\r\nMost businesses today","og:title":"Barracuda Backup","og:description":"Barracuda Backup is a unified, cost-effective data protection solution for your physical, virtual, and SaaS environments. It’s a complete backup solution with remote storage that is easy to buy, install, and manage.\r\nPhysical and Virtual\r\nMost businesses today"},"eventUrl":"","translationId":1393,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Data protection and recovery software provide data backup, integrity and security for data backups and it enables timely, reliable and secure backup of data from a host device to destination device. Recently, Data Protection and Recovery Software market are disrupted by innovative technologies such as server virtualization, disk-based backup, and cloud services where emerging players are playing an important role. Tier one players such as IBM, Hewlett Packard Enterprise, EMC Corporation, Symantec Corporation and Microsoft Corporation are also moving towards these technologies through partnerships and acquisitions.\r\nThe major factor driving data protection and recovery software market is the high adoption of cloud-based services and technologies. Many organizations are moving towards the cloud to reduce their operational expenses and to provide real-time access to their employees. However, increased usage of the cloud has increased the risk of data loss and data theft and unauthorized access to confidential information, which increases the demand for data protection and recovery solution suites.","materialsDescription":" \r\n<span style=\"font-weight: bold; \">What is Data recovery?</span>\r\nData recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).\r\nThe most common data recovery scenario involves an operating system failure, malfunction of a storage device, logical failure of storage devices, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the ultimate goal is simply to copy all important files from the damaged media to another new drive. This can be easily accomplished using a Live CD or DVD by booting directly from a ROM instead of the corrupted drive in question. Many Live CDs or DVDs provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioning and consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files.\r\nAnother scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data is not easily read from the media devices. Depending on the situation, solutions involve repairing the logical file system, partition table or master boot record, or updating the firmware or drive recovery techniques ranging from software-based recovery of corrupted data, hardware- and software-based recovery of damaged service areas (also known as the hard disk drive's "firmware"), to hardware replacement on a physically damaged drive which allows for extraction of data to a new drive. If a drive recovery is necessary, the drive itself has typically failed permanently, and the focus is rather on a one-time recovery, salvaging whatever data can be read.\r\nIn a third scenario, files have been accidentally "deleted" from a storage medium by the users. Typically, the contents of deleted files are not removed immediately from the physical drive; instead, references to them in the directory structure are removed, and thereafter space the deleted data occupy is made available for later data overwriting. In the mind of end users, deleted files cannot be discoverable through a standard file manager, but the deleted data still technically exists on the physical drive. In the meantime, the original file contents remain, often in a number of disconnected fragments, and may be recoverable if not overwritten by other data files.\r\nThe term "data recovery" is also used in the context of forensic applications or espionage, where data which have been encrypted or hidden, rather than damaged, are recovered. Sometimes data present in the computer gets encrypted or hidden due to reasons like virus attack which can only be recovered by some computer forensic experts.\r\n<span style=\"font-weight: bold;\">What is a backup?</span>\r\nA backup, or data backup, or the process of backing up, refers to the copying into an archive file of computer data that is already in secondary storage—so that it may be used to restore the original after a data loss event. The verb form is "back up" (a phrasal verb), whereas the noun and adjective form is "backup".\r\nBackups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users; a 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups represent a simple form of disaster recovery and should be part of any disaster recovery plan, backups by themselves should not be considered a complete disaster recovery plan. One reason for this is that not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server by simply restoring data from a backup.\r\nSince a backup system contains at least one copy of all data considered worth saving, the data storage requirements can be significant. Organizing this storage space and managing the backup process can be a complicated undertaking. A data repository model may be used to provide structure to the storage. Nowadays, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.\r\nBefore data are sent to their storage locations, they are selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Every backup scheme should include dry runs that validate the reliability of the data being backed up. It is important to recognize the limitations and human factors involved in any backup scheme.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Protection_and_Recovery_Software__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unauthorized access to corporate IT systems and data"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":548,"title":"Web security - Appliance","alias":"web-security-appliance","description":"A security appliance is any form of server appliance that is designed to protect computer networks from unwanted traffic. Types of network security appliance:\r\n<span style=\"font-weight: bold;\">Active devices</span> block unwanted traffic. Examples of such devices are firewalls, anti-virus scanning devices, and content filtering devices. For instance, if you want to make sure that you do not get pointless spam and other unnecessary issues, installing an active device might be a great idea. Active devices include anti-virus scanning devices, which will automatically scan throughout the network to ensure that no virus exists within the protected network. Then, there are web filtering appliances as well as firewalls, the purpose of both of which is to ensure that only useful content and traffic flows through the network and all pointless or harmful data is filtered.\r\n<span style=\"font-weight: bold;\">Passive devices detect and report on unwanted traffic.</span> A common example is intrusion detection appliances, which are installed in order to determine whether the network has been compromised in any way. These devices usually work in the background at all times.\r\n<span style=\"font-weight: bold;\">Preventative devices</span> scan networks and identify potential security problems (such as penetration testing and vulnerability assessment appliances). These devices are usually designed to 'prevent' damage to the network by identifying problems in advance. Common examples include devices that employ penetration testing as well as those devices which carry out vulnerability assessment on networks.\r\n<span style=\"font-weight: bold;\">Unified Threat Management (UTM)</span> combines features together into one system, such as some firewalls, content filtering, web caching etc. UTM devices are designed to provide users with a one-stop solution to all of their network needs and internet security appliances. As the name clearly suggests, these devices provide the features of all of the other network devices and condense them into one. These devices are designed to provide a number of different network security options in one package, hence providing networks with a simple solution. Rather than installing four different devices, users can easily install one and be done with it. The market of UTM devices has exceeded the billion dollar mark already, which just goes to show how popular these devices have become amongst network users.\r\nOne of the most popular and accessible types of web security appliance tools is the hardware <span style=\"font-weight: bold;\">keylogger.</span> This device is placed covertly between the case and keyboard with an output for the computer case and input for the keyboard. As hardware standards have changed over time, a USB hardware keylogger provides access on many devices.\r\nThe <span style=\"font-weight: bold;\">web proxy appliance</span> is basically hardware you use to manage user web access. More to the point, it's the type of device that handles the blocking or controlling of suspicious programs. It's typically placed in between network users and the worldwide web; ergo, it's most popular application is serving as a central control hub over employee Internet use by corporations and enterprises. It's the in-between gateway that serves as a termination point of sorts for online communications within a network and is capable of applying a multitude of rule-based limitations on Internet traffic, web content, and requests before they even end up with end users.\r\nAnother commonly used hardware tool is the <span style=\"font-weight: bold;\">wireless antenna.</span> These can be used to surveil a wide variety of wireless communications, including local cellular and internet service networks. More mechanical and general devices may include lockpicks or portable probes and hijack chips for compromising electronic devices through the physical circuit.\r\n<span style=\"font-weight: bold;\">Secure web gateway appliances</span> are solutions to prevent advanced threats, block unauthorized access to systems or websites, stop malware, and monitor real-time activity across websites accessed by users within the institution. Software and cloud-based platforms now perform this function as well.","materialsDescription":"<h1 class=\"align-center\"> What are the top Network Security Appliance brands?</h1>\r\n<span style=\"font-weight: bold;\">Blue Coat Systems,</span> Sunnyvale, Calif.-based Blue Coat has been part of security powerhouse Symantec since 2016.\r\n<span style=\"font-weight: bold;\">F5 Networks,</span> the Seattle-based network application delivery vendor, sold about $17.6 million in network security appliances through the channel in the second quarter, NPD said.\r\n<span style=\"font-weight: bold;\">SonicWall.</span>Firewall power player SonicWall sold about $23.5 million in network security appliances through the channel in the second quarter, according to NPD.\r\n<span style=\"font-weight: bold;\">Fortinet,</span> Sunnyvale, Calif., security software vendor Fortinet sold about $24.4 million in network security appliances through the channel in the second quarter, NPD said.\r\n<span style=\"font-weight: bold;\">Cisco Systems,</span> Cisco Systems was the quarter's growth champion, posting $77.2 million in network security appliance sales through the channel in the period, beating the previous year’s quarterly total of $62.3 million by about 24 percent, according to NPD.\r\n<span style=\"font-weight: bold;\">Palo Alto Networks.</span> With $94.2 million in network security appliance sales in the quarter, Palo Alto Networks was the best-selling network security appliance brand of the second quarter, according to NPD.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_security_Appliance.png"},{"id":550,"title":"Web filtering - Appliance","alias":"web-filtering-appliance","description":" <span style=\"font-weight: bold; \">A web filter appliance</span> is a device that allows the user to filter all online content for censorship purposes, such that any links, downloads, and email containing offensive materials or pornography is outright blocked or removed. Web filtering appliance can also help you prevent malware infection because, more often than not, malware is usually hidden within links that promise porn or controversial content. Moreover, because the number of online hazards is un stopped increasing every day, it's always prudent to get a web filter appliance that can adapt to the changing times and the ever-evolving hazards posed by the Internet.\r\nAt any rate, content filtering appliance has a distinct advantage over their software counterparts in terms of stable restriction features, unrestricted monitoring, no platform-based limitations, easy upgrades and improvements, and so on. That's because the best web filters are fully integrated software and hardware systems that optimize their hybrid attributes when it comes to content filtering by gaining full, unmitigated control over online usage through well-defined policies as mandated by the owner of the network or the IT security administrator.\r\nGetting a web content filtering appliance that has a list of premium-grade and detailed content analysis with predefined categories (which includes keywords for pornography, game downloads, drugs, violence, adult content, offensive content, racist content, controversial content, and the like) is a must for any major network. All of the items you'll ever need to block should be easily selectable with a click of your mouse as well; after all, sophisticated technology aside, a good web filter appliance should also be intuitive and practical to use as well.<br /> ","materialsDescription":"<h1 class=\"align-center\">How a Web Content Filter Appliance Works</h1>\r\n<p class=\"align-left\">Typically a web content filter appliance protects Internet users and networks by using a combination of blacklists, URIBL and SURBL filters, category filters and keyword filters. Blacklists, URIBL and SURBL filters work together to prevent users visiting websites known to harbor malware, those that have been identified as fake phishing sites, and those who hid their true identity by using the whois privacy feature or a proxy server. Genuine websites have no reason to hide their true identity.</p>\r\n<p class=\"align-left\">In the category filtering process, the content of millions of webpages are analyzed and assigned a category. System administrators can then choose which categories to block access to (i.e. online shopping, alcohol, pornography, gambling, etc.) depending on whether the web content filter appliance is providing a service to a business, a store, a school, a restaurant, or a workplace. Most appliances for filtering web content also offer the facility to create bespoke categories.</p>\r\n<p class=\"align-left\">Keyword filters have multiple uses. They can be used to block access to websites containing specific words (for example the business name of a competitor), specific file extensions (typically those most commonly used for deploying malware and ransomware), and specific web applications; if, for example, a business wanted to allow its marketing department access to Facebook, but not FaceTime. Effectively, the keyword filters fine-tune the category settings, enhance security and increase productivity.</p>\r\n<h1 class=\"align-center\">Are there any home web filter appliance?</h1>\r\nFor children today, the Internet has always existed. To them, it’s second nature to pop online and watch a funny video, find a fact, or chat with a friend. But, of course, the Internet is also filled with a lot of dark corners (It’s a hop, skip, and a click to adult content). Parents, then, are presented with the daunting task of not only monitoring what sites their children visit but also their screen time consumption. There are a number of home content filtering appliance that allow parents to do just this. The best parental control apps and devices, be they hardware or software, not only put parents in command of such things as the content their children can view and the amount of time they can spend online but help restore a parent’s sense of control. With them, parents, from can restrict access to only specific sites and apps, filter dangerous or explicit web-content, manage time, and even track their location.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_filtering_Appliance.png"},{"id":552,"title":"Secure Web Gateway - Appliance","alias":"secure-web-gateway-appliance","description":"Secure web gateways are generally appliance-based security solutions that prevent advanced threats, block unauthorized access to systems or websites, stop malware, and monitor real-time activity across websites accessed by users within the institution.\r\nA secure web gateway is primarily used to monitor and prevent malicious traffic and data from entering, or even leaving, an organization’s network. Typically, it is implemented to secure an organization against threats originating from the Internet, websites and other Web 2.0 products/services. It is generally implemented through a hardware gateway device implemented at the outer boundaries of a network. Some of the features a secure Web gateway provides include URL filtering, application-level control, data leakage prevention, and virus/malware code detection.\r\nA Secure web gateway (SWG) protects users against phishing, malware and other Internet-borne threats. Unlike traditional firewalls, SWGs are focused on layer 7 web traffic inspection, both inbound and outbound. As web security solutions, they apply no protection to WAN traffic, which is left to the corporate next generation firewalls. In recent years, SWGs appeared as a cloud service. The cloud instances enable secure web and cloud access from anywhere – including outside the office by mobile users. The traffic coverage and solution form factor remain the key distinctions between SWGs and next generation firewalls, which often provide a very similar level of security capabilities.\r\nA converged, cloud-based network security solution converges the capabilities of a next generation firewall (WAN and Internet traffic inspection) and the extended coverage for mobile users of SWGs.\r\nA converged approach eliminates the need to maintain policies across multiple point solutions and the appliance life cycle.","materialsDescription":"<span style=\"font-weight: bold;\">Why is a secure web gateway important?</span>\r\nSecure web gateways have become increasingly common as cybercriminals have grown more sophisticated in embedding threat vectors into seemingly innocuous or professional-looking websites. These counterfeit websites can compromise the enterprise as users access them, unleashing malicious code and unauthorized access in the background without the user's knowledge. These fake, criminal websites can be quite convincing.\r\nSome of these scam websites appear to be so authentic that they can convince users to enter credit card numbers and personal identification information (PII) such as social security numbers. Other sites require only the connection to the user to bypass web browser controls and inject malicious code such as viruses or malware into the user's network. Examples include fake online shopping sites posing as brand-name sellers, sites that appear to be legitimate government agencies and even business-to-business intranets. Secure web gateways can also prevent data from flowing out of an organization, making certain that restricted data is blocked from leaving the organization.\r\n<span style=\"font-weight: bold;\">How does a secure web gateway work?</span>\r\nSecure web gateways are installed as a software component or a hardware device on the edge of the network or at user endpoints. All traffic to and from users to other networks must pass through the gateway that monitors it. The gateway monitors this traffic for malicious code, web application use, and all user/non-user attempted URL connections.\r\nThe gateway checks or filters website URL addresses against stored lists of known and approved websites—all others not on the approved lists can be explicitly blocked. Known malicious sites can be explicitly blocked as well. URL filters that maintain allowed web addresses are maintained in whitelists, while known, off-limits sites that are explicitly blocked are maintained in blacklists. In enterprises, these lists are maintained in the secure gateway's database, which then applies the list filters to all incoming and outgoing traffic.\r\nSimilarly, data flowing out of the network can be checked, disallowing restricted data sources—data on the network or user devices that are prohibited from distribution. Application-level controls can also be restricted to known and approved functions, such as blocking uploads to software-as-a-service (SaaS) applications (such as Office 365 and Salesforce.com). Although some enterprises deploy secure web gateways in hardware appliances that filter all incoming and outgoing traffic, many organizations use cloud-based, SaaS secure web gateways as a more flexible and less costly solution to deploy and maintain. Organizations with existing hardware investments often combine the two, using hardware at their larger physical sites and cloud-based gateways for remote locations and traveling workers.\r\n<span style=\"font-weight: bold;\">What are some features of secure web gateways?</span>\r\nBeyond basic URL, web application control and data filtering, secure web gateways should provide additional controls and features that enhance network security.\r\n<ul><li>Encrypted traffic analysis. The gateway should compare all traffic to local and global threat lists and reputation sources first, then also analyze the nature of the traffic itself to determine if any content or code poses a threat to the network. This should include SSL-based encrypted traffic.</li><li>Data Loss Prevention. If, for example, a website accepts uploaded documents or data, the documents should first be scanned for sensitive data before being uploaded.</li><li>Social media protection. All information to and from social media should be scanned and filtered.</li><li>Support for all protocols. HTTP, HTTPS, and FTP internet protocols must be supported. While HTTPS is the industry standard now, many sites still support HTTP and FTP connections.</li><li>Integration with zero-day anti-malware solutions. Threats will be discovered, and integration with anti-malware solutions that can detect zero-day (never seen before) threats deliver the best prevention and remediation.</li><li>Integration with security monitoring. Security administrators should be notified of any web gateway security problems via their monitoring solution of choice, typically a security information and event management (SIEM) solution.</li><li>Choice of location. Choose where your secure web gateway best fits in your network—the edge, at endpoints, or in the cloud.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Secure_Web_Gateway_Appliance.png"},{"id":485,"title":"Web security","alias":"web-security","description":" Web security basically means protecting a website or web application by detecting, preventing and responding to cyber threats.\r\nWebsites and web applications are just as prone to security breaches as physical homes, stores, and government locations. Unfortunately, cybercrime happens every day, and great web security measures are needed to protect websites and web applications from becoming compromised.\r\nThat’s exactly what web security does – it is a system of protection measures and protocols that can protect your website or web application from being hacked or entered by unauthorized personnel. This integral division of Information Security is vital to the protection of websites, web applications, and web services. Anything that is applied over the Internet should have some form of web security to protect it.\r\nThere are a lot of factors that go into web security and web protection. Any website or application that is secure is surely backed by different types of checkpoints and techniques for keeping it safe.\r\nThere are a variety of security standards that must be followed at all times, and these standards are implemented and highlighted by the OWASP. Most experienced web developers from top cybersecurity companies will follow the standards of the OWASP as well as keep a close eye on the Web Hacking Incident Database to see when, how, and why different people are hacking different websites and services.\r\nEssential steps in protecting web apps from attacks include applying up-to-date encryption, setting proper authentication, continuously patching discovered vulnerabilities, avoiding data theft by having secure software development practices. The reality is that clever attackers may be competent enough to find flaws even in a fairly robust secured environment, and so a holistic security strategy is advised.\r\nThere are different types of technologies available for maintaining the best security standards. Some popular technical solutions for testing, building, and preventing threats include black and white box testing tools, fuzzing tools, WAF, security or vulnerability scanners, password cracking tools, and so on.","materialsDescription":" <span style=\"font-weight: bold; \">What is Malware?</span>\r\nThe name malware is short for ‘malicioussoftware’. Malware includes any software program that has been created to perform an unauthorised — and often harmful — action on a user’s device. Examples of malware include:\r\n<ul><li>Computer viruses</li><li>Word and Excel macro viruses</li><li>Boot sector viruses</li><li>Script viruses — including batch, Windows shell, Java and others</li><li>Keyloggers</li><li>Password stealers</li><li>Backdoor Trojan viruses</li><li>Other Trojan viruses</li><li>Crimeware</li><li>Spyware</li><li>Adware... and many other types of malicious software programs</li></ul>\r\n<span style=\"font-weight: bold; \">What is the difference between a computer virus and a worm?</span>\r\n<span style=\"font-weight: bold; \">Computer virus.</span> This is a type of malicious program that can replicate itself — so that it can spread from file to file on a computer, and can also spread from one computer to another. Computer viruses are often programmed to perform damaging actions — such as corrupting or deleting data. The longer a virus remains undetected on your machine, the greater the number of infected files that may be on your computer.\r\n<span style=\"font-weight: bold; \">Worms.</span> Worms are generally considered to be a subset of computer viruses — but with some specific differences:\r\n<ul><li>A worm is a computer program that replicates, but does not infect other files.</li><li>The worm will install itself once on a computer — and then look for a way to spread to other computers.</li><li>Whereas a virus is a set of code that adds itself to existing files, a worm exists as a separate, standalone file.</li></ul>\r\n<span style=\"font-weight: bold; \">What is a Trojan virus?</span>\r\nA Trojan is effectively a program that pretends to be legitimate software — but, when launched, it will perform a harmful action. Unlike computer viruses and worms, Trojans cannot spread by themselves. Typically, Trojans are installed secretly and they deliver their malicious payload without the user’s knowledge.\r\nCybercriminals use many different types of Trojans — and each has been designed to perform a specific malicious function. The most common are:\r\n<ul><li>Backdoor Trojans (these often include a keylogger)</li><li>Trojan Spies</li><li>Password stealing Trojans</li><li>Trojan Proxies — that convert your computer into a spam distribution machine</li></ul>\r\n<span style=\"font-weight: bold; \">Why are Trojan viruses called Trojans?</span>\r\nIn Greek mythology — during the Trojan war — the Greeks used subterfuge to enter the city of Troy. The Greeks constructed a massive wooden horse — and, unaware that the horse contained Greek soldiers, the Trojans pulled the horse into the city. At night, the Greek soldiers escaped from the horse and opened the city gates — for the Greek army to enter Troy.\r\nToday, Trojan viruses use subterfuge to enter unsuspecting users’ computers and devices.\r\n<span style=\"font-weight: bold; \">What is a Keylogger?</span>\r\nA keylogger is a program that can record what you type on your computer keyboard. Criminals use keyloggers to obtain confidential data — such as login details, passwords, credit card numbers, PINs and other items. Backdoor Trojans typically include an integrated keylogger.\r\n<span style=\"font-weight: bold; \">What is Phishing?</span>\r\nPhishing is a very specific type of cybercrime that is designed to trick you into disclosing valuable information — such as details about your bank account or credit cards. Often, cybercriminals will create a fake website that looks just like a legitimate site — such as a bank’s official website. The cybercriminal will try to trick you into visiting their fake site — typically by sending you an email that contains a hyperlink to the fake site. When you visit the fake website, it will generally ask you to type in confidential data — such as your login, password or PIN.\r\n<span style=\"font-weight: bold; \">What is Spyware?</span>\r\nSpyware is software that is designed to collect your data and send it to a third party — without your knowledge or consent. Spyware programs will often:\r\n<ul><li>Monitor the keys you press on your keyboard — using a keylogger</li><li>Collect confidential information — such as your passwords, credit card numbers, PIN numbers and more</li><li>Gather — or ‘harvest’ — email addresses from your computer</li><li>Track your Internet browsing habits</li></ul>\r\n<span style=\"font-weight: bold; \">What is a Rootkit?</span>\r\nRootkits are programs that hackers use in order to evade detection while trying to gain unauthorised access to a computer. Rootkits have been used increasingly as a form of stealth to hide Trojan virus activity. When installed on a computer, rootkits are invisible to the user and also take steps to avoid being detected by security software.\r\nThe fact that many people log into their computers with administrator rights — rather than creating a separate account with restricted access — makes it easier for cybercriminals to install a rootkit.\r\n<span style=\"font-weight: bold; \">What is a Botnet?</span>\r\nA botnet is a network of computers controlled by cybercriminals using a Trojan virus or other malicious program.\r\n<span style=\"font-weight: bold;\">What is a DDoS attack?</span>\r\nA Distributed-Denial-of-Service (DDoS) attack is similar to a DoS. However, a DDoS attack is conducted using multiple machines. Usually, for a DDoS attack, the hacker will use one security compromised computer as the ‘master’ machine that co-ordinates the attack by other ‘zombie machines’. Typically, the cybercriminal will compromise the security on the master and all of the zombie machines, by exploiting a vulnerability in an application on each computer — to install a Trojan or other piece of malicious code.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/security-web-application-security.png"},{"id":25,"title":"Web filtering","alias":"web-filtering","description":" <span style=\"font-weight: bold; \">Web filtering</span> is a technology that stops users from viewing certain URLs or websites by preventing their browsers from loading pages from these sites. Web filters are made in different ways and deliver various solutions for individual, family, institutional or enterprise use.\r\nIn general, Web filters work in two distinct ways. They can <span style=\"font-weight: bold; \">block content</span> as determined by quality of the site, by consulting known lists which document and categorize popular pages across all genres of content. Or, they can <span style=\"font-weight: bold; \">evaluate the content</span> of the page live and block it accordingly. Many Web filter tools work off of a constantly updated URL database that shows which websites and domains are associated with hosting malware, phishing, viruses or other tools for harmful activities.\r\n<span style=\"font-weight: bold;\">Web Filtering Types.</span> <span style=\"font-style: italic;\">Blacklist & Whitelist Filters:</span>when using blacklists, an administrator (which might be a parent) manually enters all websites that are deemed inappropriate into the program, and those sites are subsequently blocked. Whitelists are used in exactly the same way, only in reverse – i.e. URLs are manually entered onto a whitelist, and all other websites are then off-limits.\r\n<span style=\"font-style: italic; \">Keyword And Content Filters: </span>this type of filtering is in many ways similar to black and whitelist filtering, though with a slightly broader scope. Keyword and content filters will filter out websites that contain specific keywords or predefined content (such as pornography, for example).\r\nSome website filtering software also provides reporting so that the installer can see what kind of traffic is being filtered and who has requested it. Some products provide soft blocking (in which a warning page is sent to the user instead of the requested page while still allowing access to the page) and an override capability that allows an administrator to unlock a page. \r\n<span style=\"font-weight: bold; \">Web Filtering Software for Business.</span> Most organizations have moved to cloud based-applications, making browsers a tool that employees use on a daily basis to access work. Browsers have become a conduit to not only the cloud, but also to immeasurable malware and distractions hosted on the web. In order to ensure that browsers do not bring in malicious traffic, web filtering software becomes necessary.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">What is Enterprise Web Filtering Software?</h1>\r\nAntivirus and antimalware software are required to detect malicious programs that has been downloaded, but it is now important for enterprise web filtering software to be installed. Content filtering software is an invaluable protection against a wide range of web-borne threats. Rather than allowing malware and ransomware to be downloaded, it prevents end users from visiting websites that contain these malicious threats.\r\nInternet filtering software is also one of the most effective ways to neutralize the threat from phishing. Phishing is a technique used by cybercriminals to gain access to sensitive user information. Phishers trick end users into revealing login credentials or downloading malicious software onto their computers.\r\nPhishing involves sophisticated social engineering techniques to fool end users into visiting malicious websites. If employees can be convinced to reveal sensitive information or download ransomware or malware, cybercriminals can easily bypass even the most sophisticated of cybersecurity defenses.\r\n<h1 class=\"align-center\">What is URL Filtering?</h1>\r\nURL filtering is a type of network filtering software that helps businesses control their users’ and guests’ ability to access certain content on the web. If you’ve ever gotten a “block” page while surfing the internet at the office, then your company is using web filtering.\r\nSome employers may only be concerned about blocking access to websites that are known to spread malware or steal information. Other businesses may block content they find inappropriate, such as adult websites or sites that promote violence, or content that violates compliance regulations. They may also choose to activate web protection software to block social media or video streaming sites to minimize drains on productivity and network bandwidth.\r\nTypically, URL filtering software is provided by a cybersecurity service, firewall, or router. Each of these may use a variety of threat intelligence sources to determine which websites fit into their chosen acceptable and unacceptable categories. That’s where highly reliable web reputation services are most valuable. Sources that have extensive web histories and real-time active crawling services will provide the most accurate content determinations.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_filtering.png"},{"id":487,"title":"Secure Web Gateway","alias":"secure-web-gateway","description":" <span style=\"font-weight: bold; \">Secure Web gateway</span> solutions protect Web-surfing PCs from infection and enforce company policies. A secure Web gateway is a solution that filters unwanted software/malware from user-initiated Web/Internet traffic and enforces corporate and regulatory policy compliance. \r\nThese gateways must, at a minimum, include URL filtering, malicious-code detection and filtering, and application controls for popular Web-based applications, such as instant messaging (IM) and Skype. Native or integrated data leak prevention is also increasingly included. Data leak prevention features are also essential. Let's take a look at some of these features in more detail:\r\n<span style=\"font-weight: bold;\">Real-Time Traffic Inspection.</span> A secure web gateway inspects web traffic in real-time, analyzing content against corporate policies and ensuring any content that is inappropriate or which contravenes company policy is blocked. The majority of secure web gateways allow administrators to enforce common security policy templates straight off the shelf and also configure policies that are suited to their business model or compliance requirements.\r\n<span style=\"font-weight: bold;\">Protection for Off-Grid Workers.</span> As workforces become more distributed, there is a need for security solutions to offer protection on an anywhere, anytime and any device basis. A secure web gateway allows roaming users to authenticate seamlessly and to have the same security policies applies to their devices as they would if they were in the office. The result is a protected connection no matter where they are working and total peace of mind that all internet traffic is secure.\r\n<span style=\"font-weight: bold;\">Time and Content-Based Access.</span> Whether you need to restrict access to the internet at specific times, or you wish to control access to particular web content, your secure web gateway can be configured to suit your acceptable use policy and compliance requirements. Individual users can be allocated time quotas or schedules that ensure maximum productivity or only permitted access to websites that are relevant to their job roles.\r\n<span style=\"font-weight: bold;\">Data Leak Prevention.</span> As its name suggests, data leak prevention stops your corporate data from being leaked to or stolen by a third party. From detecting common business terms such as payment card industry (PCI) number patterns and phrases or personally identifiable information, a web security gateway coupled with data leak prevention software can be a very robust line of defense from both internal and external threats.","materialsDescription":"<h1 class=\"align-center\"> Secure web gateway market</h1>\r\nThere are a variety of <span style=\"font-weight: bold;\">secure web gateway vendors</span> operating - among them Symantec, iboss, F5, Check Point Software, zScaler, Barracuda, Forcepoint, McAfee and Cisco<span style=\"font-style: italic;\">. </span>Most of these companies are now emphasizing <span style=\"font-weight: bold;\">cloud web gateway</span>. Although many still carry, maintain and market their on-premises versions, the competitive battleground has largely shifted to the cloud.\r\nAccording to Gartner, Symantec and Cisco are the market leaders in terms of revenue. Their efforts in this space give an indication of where the market is heading. Symantec favors proxy-based SWG appliances and services. Cisco, on the other hand, has concentrated on a hybrid of DNS and proxy capabilities. Both have acquired CASB technology and have been integrating it with their secure web gateway services. Cisco has also added DNS-based inspection into its package. This allows it to use DNS for most inspection traffic to raise performance. More involved content inspection of potentially risky websites can be done using HTTP/HTTPS proxying.\r\nCloud based secure web gateway offerings have been growing at around 30 percent per year for the last several years, according to Gartner. When coupled with growing integration with other security features, on-premises standalone secure web gateways are slowly giving way to larger cloud-based suites that incorporate gateway security. \r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Secure_Web_Gateway.png"},{"id":46,"title":"Data Protection and Recovery Software","alias":"data-protection-and-recovery-software","description":"Data protection and recovery software provide data backup, integrity and security for data backups and it enables timely, reliable and secure backup of data from a host device to destination device. Recently, Data Protection and Recovery Software market are disrupted by innovative technologies such as server virtualization, disk-based backup, and cloud services where emerging players are playing an important role. Tier one players such as IBM, Hewlett Packard Enterprise, EMC Corporation, Symantec Corporation and Microsoft Corporation are also moving towards these technologies through partnerships and acquisitions.\r\nThe major factor driving data protection and recovery software market is the high adoption of cloud-based services and technologies. Many organizations are moving towards the cloud to reduce their operational expenses and to provide real-time access to their employees. However, increased usage of the cloud has increased the risk of data loss and data theft and unauthorized access to confidential information, which increases the demand for data protection and recovery solution suites.","materialsDescription":" \r\n<span style=\"font-weight: bold; \">What is Data recovery?</span>\r\nData recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).\r\nThe most common data recovery scenario involves an operating system failure, malfunction of a storage device, logical failure of storage devices, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the ultimate goal is simply to copy all important files from the damaged media to another new drive. This can be easily accomplished using a Live CD or DVD by booting directly from a ROM instead of the corrupted drive in question. Many Live CDs or DVDs provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioning and consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files.\r\nAnother scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data is not easily read from the media devices. Depending on the situation, solutions involve repairing the logical file system, partition table or master boot record, or updating the firmware or drive recovery techniques ranging from software-based recovery of corrupted data, hardware- and software-based recovery of damaged service areas (also known as the hard disk drive's "firmware"), to hardware replacement on a physically damaged drive which allows for extraction of data to a new drive. If a drive recovery is necessary, the drive itself has typically failed permanently, and the focus is rather on a one-time recovery, salvaging whatever data can be read.\r\nIn a third scenario, files have been accidentally "deleted" from a storage medium by the users. Typically, the contents of deleted files are not removed immediately from the physical drive; instead, references to them in the directory structure are removed, and thereafter space the deleted data occupy is made available for later data overwriting. In the mind of end users, deleted files cannot be discoverable through a standard file manager, but the deleted data still technically exists on the physical drive. In the meantime, the original file contents remain, often in a number of disconnected fragments, and may be recoverable if not overwritten by other data files.\r\nThe term "data recovery" is also used in the context of forensic applications or espionage, where data which have been encrypted or hidden, rather than damaged, are recovered. Sometimes data present in the computer gets encrypted or hidden due to reasons like virus attack which can only be recovered by some computer forensic experts.\r\n<span style=\"font-weight: bold;\">What is a backup?</span>\r\nA backup, or data backup, or the process of backing up, refers to the copying into an archive file of computer data that is already in secondary storage—so that it may be used to restore the original after a data loss event. The verb form is "back up" (a phrasal verb), whereas the noun and adjective form is "backup".\r\nBackups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users; a 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups represent a simple form of disaster recovery and should be part of any disaster recovery plan, backups by themselves should not be considered a complete disaster recovery plan. One reason for this is that not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server by simply restoring data from a backup.\r\nSince a backup system contains at least one copy of all data considered worth saving, the data storage requirements can be significant. Organizing this storage space and managing the backup process can be a complicated undertaking. A data repository model may be used to provide structure to the storage. Nowadays, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.\r\nBefore data are sent to their storage locations, they are selected, extracted, and manipulated. Many different techniques have been developed to optimize the backup procedure. These include optimizations for dealing with open files and live data sources as well as compression, encryption, and de-duplication, among others. Every backup scheme should include dry runs that validate the reliability of the data being backed up. It is important to recognize the limitations and human factors involved in any backup scheme.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Protection_and_Recovery_Software__1_.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.barracuda.com/resources/Barracuda_Backup_CS_Hayward_Tyler_US","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":1173,"title":"Bentley AssetWise for Pan Borneo Malaysian Highway","description":"<span style=\"font-style: italic;\"><span style=\"color: rgb(97, 97, 97); \">Description is not ready yet</span></span><br />","alias":"bentley-assetwise-for-pan-borneo-malaysian-highway","roi":0,"seo":{"title":"Bentley AssetWise for Pan Borneo Malaysian Highway","keywords":"","description":"<span style=\"font-style: italic;\"><span style=\"color: rgb(97, 97, 97); \">Description is not ready yet</span></span><br />","og:title":"Bentley AssetWise for Pan Borneo Malaysian Highway","og:description":"<span style=\"font-style: italic;\"><span style=\"color: rgb(97, 97, 97); \">Description is not ready yet</span></span><br />"},"deal_info":"","user":{"id":8780,"title":"Lebuhraya Borneo Utara (LBU)","logoURL":"https://old.roi4cio.com/uploads/roi/company/Lebuhraya_Borneo_Utara.jpg","alias":"lebuhraya-borneo-utara-lbu","address":"Kuching, Sarawak","roles":[],"description":"Lebuhraya Borneo Utara Sdn.Bhd (LBU) is the Project Delivery Partner (PDP) for the Pan Borneo Highway Sarawak. A home-grown Sarawak company based in Kuching, Sarawak, LBU consists of a team of qualified Bumiputera personnel with construction as well as project development and management experience. LBU is supported by a Board of Directors with highway construction specialist expertise crucial for the delivery of the Highway according to time and budget specifications.<br />It has been a long journey for LBU to develop and propose a suitable and workable project concept to the Government of Malaysia for the Pan Borneo Highway. Apart from delivering the best value, LBU made a commitment to the Government to involve local talents, contractors, companies and resources towards building up local expertise in highway construction.<br />Source: https://www.linkedin.com/company/lebuhraya-borneo-utara-sdn.bhd<br /><br />","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.panborneo.com.my/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Lebuhraya Borneo Utara (LBU)","keywords":"","description":"Lebuhraya Borneo Utara Sdn.Bhd (LBU) is the Project Delivery Partner (PDP) for the Pan Borneo Highway Sarawak. A home-grown Sarawak company based in Kuching, Sarawak, LBU consists of a team of qualified Bumiputera personnel with construction as well as project","og:title":"Lebuhraya Borneo Utara (LBU)","og:description":"Lebuhraya Borneo Utara Sdn.Bhd (LBU) is the Project Delivery Partner (PDP) for the Pan Borneo Highway Sarawak. A home-grown Sarawak company based in Kuching, Sarawak, LBU consists of a team of qualified Bumiputera personnel with construction as well as project","og:image":"https://old.roi4cio.com/uploads/roi/company/Lebuhraya_Borneo_Utara.jpg"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"in_process","statusLabel":"In Process","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":8,"title":"Reduce Production Timelines"},{"id":9,"title":"Support Decision Making"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":180,"title":"Inability to forecast execution timelines"},{"id":334,"title":"Poor timing of management decision making"},{"id":370,"title":"No automated business processes"},{"id":393,"title":"Complex and non-transparent business processes"},{"id":400,"title":"High costs"}]}},"categories":[],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"","title":"-"}},"comments":[],"referencesCount":0},{"id":1280,"title":"Bentley PLAXIS 3D for the engineering company Adviseurs in Bouwtechniek (ABT)","description":"<span style=\"font-style: italic;\">Description is not ready yet</span>","alias":"bentley-plaxis-3d-for-the-engineering-company-adviseurs-in-bouwtechniek-abt","roi":0,"seo":{"title":"Bentley PLAXIS 3D for the engineering company Adviseurs in Bouwtechniek (ABT)","keywords":"","description":"<span style=\"font-style: italic;\">Description is not ready yet</span>","og:title":"Bentley PLAXIS 3D for the engineering company Adviseurs in Bouwtechniek (ABT)","og:description":"<span style=\"font-style: italic;\">Description is not ready yet</span>"},"deal_info":"","user":{"id":9338,"title":"Adviseurs in Bouwtechniek (ABT)","logoURL":"https://old.roi4cio.com/uploads/roi/company/abt_logo.png","alias":"adviseurs-in-bouwtechniek-abt","address":"","roles":[],"description":"From the time that it was established in 1953, ABT's approach has been characterised by striving for 'representative structures and doable architecture'. On the basis of giving content to the concept of 'integrated design'. In order to arrive at a feasible project within the limiting conditions of time and cost, ABT evolved at an early stage into a multi-disciplinary engineering practice. In 1965 a number of structural consultancy areas were added to the building consultancy.\r\nABT has now expanded into a pioneering engineering practice, with branches in Velp, Delft and Enschede, that provides a complete range of structural services from both a building and a design aspect.\r\nSource: https://www.abt.eu/en/organisation/history.aspx","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.abt.eu/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Adviseurs in Bouwtechniek (ABT)","keywords":"","description":"From the time that it was established in 1953, ABT's approach has been characterised by striving for 'representative structures and doable architecture'. On the basis of giving content to the concept of 'integrated design'. In order to arrive at a feasible pro","og:title":"Adviseurs in Bouwtechniek (ABT)","og:description":"From the time that it was established in 1953, ABT's approach has been characterised by striving for 'representative structures and doable architecture'. On the basis of giving content to the concept of 'integrated design'. In order to arrive at a feasible pro","og:image":"https://old.roi4cio.com/uploads/roi/company/abt_logo.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":307,"title":"Enhance Competitive Ability"},{"id":508,"title":"Digital Transformation"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":356,"title":"High costs of routine operations"},{"id":370,"title":"No automated business processes"},{"id":376,"title":"Unstructured data"},{"id":394,"title":"Shortage of information for decision making"},{"id":400,"title":"High costs"}]}},"categories":[],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.bentley.softprom.com/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1282,"title":"Bentley PLAXIS for Waldorf Astoria Hotel in London","description":"<span style=\"font-style: italic;\">Description is not ready yet</span>","alias":"bentley-plaxis-for-waldorf-astoria-hotel-in-london","roi":0,"seo":{"title":"Bentley PLAXIS for Waldorf Astoria Hotel in London","keywords":"","description":"<span style=\"font-style: italic;\">Description is not ready yet</span>","og:title":"Bentley PLAXIS for Waldorf Astoria Hotel in London","og:description":"<span style=\"font-style: italic;\">Description is not ready yet</span>"},"deal_info":"","user":{"id":9351,"title":"WSP Global Inc.","logoURL":"https://old.roi4cio.com/uploads/roi/company/wsp_logo.jpg","alias":"wsp-global-inc","address":"","roles":[],"description":"WSP is one of the world's leading professional services consulting firms. Provides services of technical experts and strategic advisors including engineers, technicians, scientists, architects, planners, surveyors and environmental specialists, as well as other design, program and construction management professionals. Designs lasting solutions in the Transportation & Infrastructure, Property & Buildings, Environment, Power & Energy, Resources and Industry sectors, as well as offering strategic advisory services. \r\nSource: https://www.linkedin.com/company/wsp/about/","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://wsp.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"WSP Global Inc.","keywords":"","description":"WSP is one of the world's leading professional services consulting firms. Provides services of technical experts and strategic advisors including engineers, technicians, scientists, architects, planners, surveyors and environmental specialists, as well as othe","og:title":"WSP Global Inc.","og:description":"WSP is one of the world's leading professional services consulting firms. Provides services of technical experts and strategic advisors including engineers, technicians, scientists, architects, planners, surveyors and environmental specialists, as well as othe","og:image":"https://old.roi4cio.com/uploads/roi/company/wsp_logo.jpg"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":8,"title":"Reduce Production Timelines"},{"id":9,"title":"Support Decision Making"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":180,"title":"Inability to forecast execution timelines"},{"id":356,"title":"High costs of routine operations"},{"id":392,"title":"Lengthy production timelines"},{"id":394,"title":"Shortage of information for decision making"},{"id":397,"title":"Insufficient risk management"}]}},"categories":[],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":" https://www.bentley.softprom.com/ ","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1107,"title":"Cofense PhishMe for Global Financial Services Company","description":"Our company started working with Cofense several years ago. We began to launch phishing simulations and also deployed the Reporter button. We saw our phishing susceptibility rate drop steadily and user reporting go up. Today, our reporting rate in simulations is around 60%.<br />Even better, team members are reporting real phishing emails that got past tools like secure email gateways (SEGs). With such good results, we went straightaway into using Cofense Triage and Intelligence as well.\r\nWe don’t want team members to spend a moment thinking, okay, this email I got — is it really a phish? Even if it’s an internal email, we tell them to report it and Triage will take care of it.\r\nCofense Reporter sends our SOC analysts a clean set of emails, properly formatted, with all the information they need. Then Triage handles noise reduction, so analysts spend time only on genuine phishing threats.<br />When they look at an email, they can easily see which other team members received it and, if necessary, pull it from their inboxes.\r\nWe also sometimes see clients whose emails have been compromised and used in phishing attacks. Our team members are familiar with the email addresses but they don’t click, because they know the language is odd or something else is off. In one instance, when we notified the client they were able to alert their entire customer base within a day.\r\nNormally, when we reach out to compromised clients they aren’t aware of the problem. This has happened often enough that our clients, along with our internal teams, see the benefit of what we’re doing.\r\nOur security team likes the Intelligence product because it’s based on emails that bypassed security rules. The team also says the intel correlates with what they see. Some intelligence products flag these same threats, but not as quickly. The team’s overall opinion is they love the product—it’s really useful.\r\nMy team in security awareness feels the same about Cofense PhishMe. We had used products from other vendors with not much success. We weren’t able to do monthly phishing simulations, so we had to settle for periodic simulations. As soon as we got on board with Cofense, we could easily run monthly exercises. That dropped our susceptibility rates pretty rapidly.\r\nWhy is it important to do monthly exercises? Well, not doing it every month wasn’t working. We used to have susceptibility rates around 25%. While our rates have dropped, we also realized we would never get to zero clicks, so reporting is the key metric.\r\nWorking with Cofense, we show value by helping to stop phishing attacks technology missed. It’s hard to get a dedicated budget for security awareness. But teams across the company understand what we’re doing. People talk about it, including the board of directors. They know that data protection is our number one risk.<br />Our program has received a lot of visibility and that’s been awesome. It’s really driven security awareness and made our company much more secure.\r\n\r\nBy: Information Security Analyst, Global Financial Services Company","alias":"cofense-phishme-dlja-global-financial-services-company","roi":0,"seo":{"title":"Cofense PhishMe for Global Financial Services Company","keywords":"","description":"Our company started working with Cofense several years ago. We began to launch phishing simulations and also deployed the Reporter button. We saw our phishing susceptibility rate drop steadily and user reporting go up. Today, our reporting rate in simulations ","og:title":"Cofense PhishMe for Global Financial Services Company","og:description":"Our company started working with Cofense several years ago. We began to launch phishing simulations and also deployed the Reporter button. We saw our phishing susceptibility rate drop steadily and user reporting go up. Today, our reporting rate in simulations "},"deal_info":"","user":{"id":8754,"title":"Global Financial Services, Inc.","logoURL":"https://old.roi4cio.com/uploads/roi/company/Global_Financial_Services__Inc._Logo.png","alias":"global-financial-services-inc","address":"","roles":[],"description":" Global Financial Services is composed of a group of highly experienced and seasoned, certified, financial professionals. With our knowledge and expertise, we can usually find a solution for all your financing needs. Unlike a bank, or local lending institution, which only lend to the most credit-worthy businesses, Global Financial Services, with its relationships with national lenders, can usually find you the financing you need.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.globaleasing.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Global Financial Services, Inc.","keywords":"","description":" Global Financial Services is composed of a group of highly experienced and seasoned, certified, financial professionals. With our knowledge and expertise, we can usually find a solution for all your financing needs. Unlike a bank, or local lending institution","og:title":"Global Financial Services, Inc.","og:description":" Global Financial Services is composed of a group of highly experienced and seasoned, certified, financial professionals. With our knowledge and expertise, we can usually find a solution for all your financing needs. Unlike a bank, or local lending institution","og:image":"https://old.roi4cio.com/uploads/roi/company/Global_Financial_Services__Inc._Logo.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":5373,"title":"Cofense","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cofense.png","alias":"cofense","address":"","roles":[],"description":" Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions world-wide. \r\nCompany delivers a collaborative approach to cybersecurity by enabling organization-wide engagement to active email threats. \r\nTheir collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees to stop attacks in progress faster and stay ahead of breaches. \r\nFrom driving awareness to security automation and orchestration, Cofense solutions are designed to anticipate and disrupt the attack kill chain at delivery to quickly mitigate the impacts from spear phishing, ransomware, malware, and business email compromise. \r\nToday this is all made real for thousands of global organizations in the defense, energy, financial services, healthcare, and manufacturing sectors that understand how changing user behavior will improve security, aid incident response, and reduce the risk of compromise.\r\nSource:https://www.linkedin.com/company/cofense/about/","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":16,"vendorImplementationsCount":17,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.cofense.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cofense","keywords":"","description":" Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions world-wide. \r\nCompany delivers a collaborative approach to cybersecurity by enabling organization-wide engagement to active email threats. \r\nTheir collective defense","og:title":"Cofense","og:description":" Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions world-wide. \r\nCompany delivers a collaborative approach to cybersecurity by enabling organization-wide engagement to active email threats. \r\nTheir collective defense","og:image":"https://old.roi4cio.com/uploads/roi/company/Cofense.png"},"eventUrl":""}],"products":[{"id":5904,"logo":false,"scheme":false,"title":"Cofense PhishMe","vendorVerified":0,"rating":"2.00","implementationsCount":17,"suppliersCount":0,"alias":"cofense-phishme","companyTypes":[],"description":"<p>Users Are NOT the Weakest Link. Let’s bust that myth right now. 100% of the phish Cofense finds in customers’ environments were reported by users. 0% were stopped by perimeter technology. When secure email gateways fail, users are your last line of defense. Will they fall for a phish or report it? Cofense PhishMeTM educates them on the real attacks your company faces, transforming vulnerable targets into active defenders.</p>\r\n<p><span style=\"font-weight: bold;\">YOUR PROBLEM</span></p>\r\n<p>No matter how good your perimeter security, phishing emails still reach users and threaten to trigger breaches. The Cofense Phishing Defense CenterTM finds that 90% of user-reported emails are in environments using secure email gateways (SEGs). Every phishing email that reaches the user is an attack on your organization. When technology fails, users need to become human sensors and report phishing, so the SOC can remediate the threat. But how can users report if they don’t recognize today’s evolving attacks?</p>\r\n<p><span style=\"font-weight: bold;\">OUR SOLUTION</span></p>\r\n<p>Teach users to identify (real) phish. Cofense PhishMe educates users on the real phishing tactics your company faces. We leverage extensive research, threat intelligence, and front-line phishing defense resources that other providers lack. We believe that real phish are the real problem. Through experiential learning—simulations of current phishing threats — you’ll condition smarter email behavior, transforming vulnerable targets into an essential layer of defense.</p>\r\n<p><span style=\"font-weight: bold;\">Click Only:</span> A phishing email that urges the recipient to click on an embedded link.</p>\r\n<p><span style=\"font-weight: bold;\">Data Entry:</span> A phishing email with a link to a customized landing page that entices users to enter sensitive information.</p>\r\n<p><span style=\"font-weight: bold;\">Attachment-based:</span> A phishing email with seemingly legitimate attachments in a variety of file formats.</p>\r\n<p><span style=\"font-weight: bold;\">Double Barrel:</span> Patented technology that simulates conversational phishing techniques by sending two emails – one benign and one containing a malicious element – to train users on this tactic used by APT groups.<br />Benchmarking: A patented feature to conduct an identical scenario and receive an additional report that provides an anonymous comparison of your results with other Cofense customers or industry peers that ran the same scenario.</p>\r\n<p><span style=\"font-weight: bold;\">Highly Personalized:</span> Simulate advanced social engineering tactics by using specific public, known details about email recipients gathered from internal and public sources.</p>","shortDescription":"Cofense PhishMe simulates active phishing threats to condition smarter user behavior.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cofense PhishMe","keywords":"","description":"<p>Users Are NOT the Weakest Link. Let’s bust that myth right now. 100% of the phish Cofense finds in customers’ environments were reported by users. 0% were stopped by perimeter technology. When secure email gateways fail, users are your last line","og:title":"Cofense PhishMe","og:description":"<p>Users Are NOT the Weakest Link. Let’s bust that myth right now. 100% of the phish Cofense finds in customers’ environments were reported by users. 0% were stopped by perimeter technology. When secure email gateways fail, users are your last line"},"eventUrl":"","translationId":5906,"dealDetails":{"avgPartnerDiscount":0,"dealProtection":1,"avgDealSize":12000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"Request demo: https://go.cofense.com/live-demo/","categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":281,"title":"No IT security guidelines"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":346,"title":"Shortage of inhouse IT resources"},{"id":382,"title":"High costs of IT personnel"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":870,"title":"Cyber Security Training and Simulation","alias":"cyber-security-training-and-simulation","description":" Cyber security training and simulation is a powerful tool for CISOs and SOC managers to accurately simulate their network and security tools within a dynamic IT, or OT environment. A high-quality cyber range offers a rich catalog of simulated incident scenarios, in varying levels of difficulty, which security managers can choose from to train their teams. This opens up numerous new opportunities, several of which include: \r\n<ul><li>An environment for team training, where security staff can improve their communication and teamwork, both of which are critical elements of an efficient incident response team, and impossible to practice using conventional training systems.</li></ul>\r\n<ul><li>A means of training the entire organization in a breach scenario and the related business dilemmas, beyond incident response, including potential business executive decisions. Consider a ransomware scenario where executives are required to decide whether to pay the ransom, negotiate, or mitigate.</li></ul>\r\n<ul><li>A test-bed for potential products where they can be tested in a safe and controlled environment.</li></ul>\r\n<ul><li>A training environment for newly introduced products enabling team members to master new technologies and dramatically improve their performance and skills.</li></ul>\r\nCyber security training and simulation is the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.\r\nThe potential of simulation-based training, as compared to traditional training, is substantial. Organizations can not only train people but also test processes and technologies in a safe environment. Furthermore, security teams can train as individuals or as a group, to improve their teamwork. With the help of simulation, your team can experience high-fidelity threat scenarios while training, and improve their capabilities, rather that encountering these threats for the first time during the actual attack. This results in a dramatic improvement in their performance.","materialsDescription":" <span style=\"font-weight: bold; \">Why do you need to train cybersecurity employees?</span>\r\nNew threats and attack vectors emerge, spanning across a converged attack surface of IT and OT networks, as well as IoT devices. Attacks have become time-sensitive, requiring SOCs to detect and respond within seconds to minutes, and challenging the SOC’s ability to perform effectively.\r\nForward thinking CISOs now understand that rushing to spend their growing budgets to purchase the latest tools, hoping that the new technology will finally improve their security posture, will not resolve their strategic, and, in many cases, existential problems. They are beginning to acknowledge that their teams are not professionally equipped to face the new generation threats, not because of the lack of products or technologies, but because they don't really know how to operate them effectively. Most of them have never trained effectively, either as individuals or as a team, never faced a multi-stage attack, and have never used their technologies in a real-life attack scenario, requiring them to respond to an evolving attack within minutes. \r\nInvesting in our cyber experts and in our SOC teams, both as individuals, as well as a unified team, is THE key to an effective SOC. In the case of cybersecurity, this challenge is amplified. The shortage in cybersecurity professionals is at a critical state and will only continue to grow, forcing cybersecurity leaders to hire unexperienced team members to fill in open positions. Security analysts, often junior and barely trained, are expected to master dozens of security products in increasing numbers, defending against threats they have never experienced before. \r\n\r\n<span style=\"font-weight: bold; \">What is a cybersecurity simulation and why is it needed?</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Traditional IT security training is largely ineffective, because it relies on sterile, mostly theoretical training. It is often conducted on the job by SOC team members rather than by professional instructors. To get our security teams prepared to face today’s multi-dimensional IT and OT security challenges, we must place them in a technology-driven environment that mirrors their own, facing real-life threats. In other words: hyper-realistic simulation. </span>\r\n<span style=\"color: rgb(97, 97, 97); \">Just as you would never send a pilot to combat before simulating emergency scenarios and potential combat situations, we should not send our cyber defenders to the field before enabling them to experience potential attacks and practicing response within a simulated environment.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">A flight simulator replicates the actual combat zone, from realistic weather conditions, aircraft instruments to enemy aircraft attacks. This realism maximizes the impact of the training session. Similarly, the way to maximize the effectiveness of security training is by providing a virtual replica of your actual “warzone” resulting in a true-to-life experience. Security teams should use the actual security tools they use at work, and should experience their familiar network setup, and traffic. Threats should be simulated accurately, including advanced, evolving threats, targeted malware and ransomware.<br /></span>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/education-training.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"-1","projectWasPut":"","price":0,"source":{"url":"","title":"Web-site of vendor"}},"comments":[],"referencesCount":0}],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":true,"isSupplier":true,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":"","vendorPartners":[],"supplierPartners":[],"vendoredProducts":[],"suppliedProducts":[],"partnershipProgramme":null}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}