Latest

Remote work can be productive and secure
5.0
20.03.20

Today, people around the world have to change dramatically their working practices and ways to manage teams of colleagues who work remotely. Fortunately, in our time, technology for full-fledged remote work not only exist, but also are also affordable, like never before. Questions with the org...

Zyfra and Softline explore Industry 4.0
5.0
18.03.20

Softline cooperates with Zyfra Group—one of the most advanced vendors in the world of Industry 4.0:  the Industrial Internet of Things, Artificial Intelligence, self-driving transport. Zyfra creates software that helps enterprises from 22 countries solve the problems of monitoring, ana...

Can IT be recovered?
5.0
02.03.20

Enterprise-level data security and recovery is a must-have for digital transformation success. The scale of corporate digital transformation projects are becoming impressive. Such technologies as the Internet of Things, Industry 4.0, Customer 360, Insurtec, not to mention the multicloud IT arc...

Deep Transformation
5.0
03.03.20

When done in a right way, digital transformation can reinvent any business process and significantly improve it. Unsurprisingly, providers of professional digital transformation services thrive, helping their clients embark on the digital transformation journey. But the paradox is that they somet...

Geoanalytics: a Tool for Efficient Business Management
4.7
04.03.20

Positioning the points of sale or branches in the locations most convenient for customers is vital for retailers and catering companies, financial institutions, and service providers. Another important thing they need is analyzing the locations of their competitors' branches. Geoanalytics all...

Our solutions: services

Can IT be recovered?
5.0
02.03.20

Enterprise-level data security and recovery is a must-have for digital transformation success. The scale of corporate digital transformation projects are becoming impressive. Such technologies as the Internet of Things, Industry 4.0, Customer 360, Insurtec, not to mention the multicloud IT arc...

Geoanalytics: a Tool for Efficient Business Management
4.7
04.03.20

Positioning the points of sale or branches in the locations most convenient for customers is vital for retailers and catering companies, financial institutions, and service providers. Another important thing they need is analyzing the locations of their competitors' branches. Geoanalytics all...

UEBA Systems, or How to Expose a Wolf in Sheep's Clothing?
4.0
06.03.20

Back in the 19th century, Nathan Rothschild made an oracular utterance: "He Who Owns Information Owns the World." Now his words are as true and relevant as never before. With the right information, you can make incredible profits, raise your business to new heights, become the first in ...

Synergy Effect
5.0
12.03.20

Website is a showcase of every company, and web applications and web portal offer the critical functions and competitive edges. How did it all start 10–15 years ago, most corporate websites acted as “business cards.” They were written in HTML and displayed static informati...

Top-Notch Support!
4.3
23.01.20

What is the core idea of technical support, outsourcing, IT platform, or system maintenance services in Softline? For us, a signed maintenance agreement is not only a document but also a convincing proof of mutually beneficial cooperation and partnership between the customer and the contractor. W...

Outsourcing: the Game is Worth the Candle
5.0
30.01.20

The purpose of any business is to create new things and make progress. Among the huge number of daily tasks and challenges, there is at least one that is recommended to be delegated to a partner—technical support of the existing IT systems. Vladimir Turlachev, Head of Technical Support and ...

Traditional Purchase, Leasing, or HaaS?
5.0
02.12.19

Sooner or later, every company has to face the need to purchase new IT equipment. Sometimes it is the first purchase for a startup, other times it is a routine equipment change-out once in several years. And every time it is not only about deciding what, and in what quantity, one needs to buy, bu...

VizorLabs Health&Safety: AI is Watching You!
5.0
17.01.20

Video surveillance is the key element of security control in manufacturing, logistics, and numerous other industries. It ensures protection from external threats, control over industrial and occupational safety measures, and reduces the incidence of injuries. As many people are inclined to vio...

Our solutions: cloud

Business Kaleidoscope: ISV Solutions on the Azure Platform
4.0
06.11.19

Azure Cloud Platform is a versatile toolkit that enables you to create efficient solutions for specific business tasks. The key advantage of Azure is that it has a vast number of applications based on the platform. If you are facing a particular business challenge, it is highly likely that the so...

Multicloud: a One-Stop Shop for Cloud Services
5.0
19.09.19

A multicloud is an IT infrastructure deployment strategy relying on several cloud providers and platforms but without a link to one service provider. There are several reasons for businesses to choose multicloud. The main reason is that they can preserve their technological and financial independ...

Azure or hybrid infrastructure as an alternative to SQL Server, Windows Server 2008 and 2008 R2
4.5
14.10.19

In 2019, Microsoft has ended the support and monthly updates of SQL Server, Windows Server 2008, and 2008 R2. As a result, the systems are subject to the risks of security and non-compliance with the requirements of legislation and regulatory authorities. The question is, how to prevent data loss...

Disk Encryption at the Service of Confidentiality
5.0
19.06.19

Disk encryption is an information protection technology that converts disk data into a code unbreakable for an intruder. It is based on the AES-NI algorithm, and keys are managed as per the KMIP 1.1 standard. All VM disk operations are encrypted on the fly—this ensures high security and rel...

Security Operations Centers. How Do They Work?
5.0
18.06.19

How did the company’s information network security system look like some 10 years ago? “Prohibit and keep out” principle was drilled into IS specialists’ minds. As soon as Odnoklassniki, VKontakte appeared, the access should be immediately closed. Managers found a game in ...

Agro-Invest Streamlines Its Development Processes Using the Cloud-Based Azure DevOps Platform
5.0
19.02.19

Business situation The Managing Agro-Invest Company, LLC. is engaged in the agriculture development in the Russian Black Earth Belt. Its head office is located in Voronezh, while its production units are scattered around Voronezh, Kursk, Lipetsk and Tambov Regions. The customer employs more th...

Digest for Microsoft Clients
5.0
08.02.19

Our company is your consultant and navigator in the world of IT: we can help keep the pace of the times and even stay ahead of it. New technologies and solutions, useful lifehacks and important events—you will find everything in our digest. Office 365 Ideal stor...

Microsoft Azure for Beginners
5.0
31.01.19

The capabilities of Microsoft Azure improve business cost-efficiency and flexibility and enable fast business growth. This is important both for companies with a solid background and for startups. Customers come to Softline when they need to solve their problems. Azure is one of the tools solv...

Our solutions: software and hardware

Zyfra and Softline explore Industry 4.0
5.0
18.03.20

Softline cooperates with Zyfra Group—one of the most advanced vendors in the world of Industry 4.0:  the Industrial Internet of Things, Artificial Intelligence, self-driving transport. Zyfra creates software that helps enterprises from 22 countries solve the problems of monitoring, ana...

Softline Digital Platform: Self-Service Subscription and Payment Management
4.3
16.03.20

Softline has developed and deployed its own Active Platform-based solution for working with subscription and cloud services in 15 countries. With this tool, customers can manage current subscriptions to products and services of several vendors, purchase new subscriptions from the catalog, manage ...

Architecting Your Business
5.0
31.01.20

The modern enterprise IT architecture, be it cloud-based or local, can be presented as a combination of several different aspects. The first level describes the main business processes of the enterprise in a general sense and defines the key points of the corporate IT strategy. The second leve...

Multi-Link Virtual WAN site connectivity
5.0
26.12.19

According to Gartner, running workloads in the cloud yields large efficiency gains and by 2020 83% of all enterprise workloads are expected to be hosted in the cloud. But many cloud migration projects fail to deliver on the goal of moving the services to the cloud that retain the same level of se...

CSP and SPLA: Short Microsoft Licensing Menu
5.0
25.11.19

The Microsoft CSP and SPLA partner licensing programs are designed to address current business challenges and help: purchase licenses for a group of companies or offer licensing services to customers   switch to a monthly pay-per-use plan with post-payment and without fixed payments ...

Threat Spotlight: Inefficient incident response
5.0
28.10.19

Inefficient incident response to email attacks is costing businesses billions in losses every year. For many organizations, finding, identifying and removing email threats is a slow and manual process that takes too long and uses too many resources. As a result, attacks often have time to spread ...

CRM for Everyone!
5.0
12.11.19

Microsoft CRM, what is it? Microsoft Customer Relationship Management System is part of Microsoft Dynamics 365. The solution improves the efficiency of your organization by optimizing business processes in sales, marketing, and service departments, enabling you to focus on building and maintai...

Three reasons why spear phishing is so effective
5.0
17.07.19

It seems you can hardly go a day without hearing about another data breach, money transfer scam, or some other crime that started out as a spear phishing attack.  Email-borne threats have always been a top priority for IT security, but spear phishing is one of the fastest growing attacks.&nb...

Digital society

Remote work can be productive and secure
5.0
20.03.20

Today, people around the world have to change dramatically their working practices and ways to manage teams of colleagues who work remotely. Fortunately, in our time, technology for full-fledged remote work not only exist, but also are also affordable, like never before. Questions with the org...

Deep Transformation
5.0
03.03.20

When done in a right way, digital transformation can reinvent any business process and significantly improve it. Unsurprisingly, providers of professional digital transformation services thrive, helping their clients embark on the digital transformation journey. But the paradox is that they somet...

How to maximize ROI of your digital transformation
4.5
12.02.20

Today, by 2020, many companies and organizations have already gone far along their path of digital transformation. Far enough to focus on the real return on investment in these initiatives and transition from pilot or point solutions to scalability at the enterprise level. All of us are waiting f...

What Does Business Need to Learn from Tech Guys?
3.0
23.03.20

If you like TV series like IT Crowd or The Big Bang Theory, then you are spiritually close to the image of a genius, nerdy, sarcastic, and knowledge-obsessed researcher, geek programmer, mathematician, or scientist—in general, a guy with a sky-high IQ. There are plenty of them among expert ...

Fear Nothing with Clouds
5.0
29.01.20

An apparent trend of the modern market is creating cloud services and delivering them from reliable data centers in full compliance with the fault tolerance and data backup rules. A Product from Russia Softline is a Russian company providing its clients with numerous cloud services. Our ...

Targeted Attacks: a Dangerous Kind of Cybercrime
4.5
31.03.20

A targeted attack is a sequence of hacking actions aimed at and tailored for a specific “victim” to steal its money or data. Softline experts note that usually, intruders do it for their profit. They have several variants of monetization: unauthorized access to online banking, encrypt...

Outlook into the Future: What Awaits the IT industry in 2020
3.0
10.12.19

The unique thing about the digital world is its ever-growing pace of change. On the one hand, that is great: every day, companies and organizations gain access to new tools enabling them to work better and more efficiently. On the other hand, accelerating progress is creating significant challeng...

The True Value of Managed Services
5.0
15.11.19

The word “service-oriented” related to the internal architecture of IT systems ten years ago, today is widely used both in business and in everyday life. The idea to package certain role or work in a ‘service’ with certain characteristics and measurable indicators of the q...

Projects

SBI Bank Uses ISOC to Protect Customer Data
4.0
26.11.19

The Bank has been connected to a new information security monitoring system, which will provide comprehensive data protection while increasing the number of retail and corporate clients. SBI Bank has been connected to the ISOC (Security Operation Center), part of Softline Group. The existing m...

Omega Motors Migrates to Microsoft Office 365
4.5
31.10.19

Softline Georgia provided the customer with modern and convenient productivity tools. About the customer Omega Motors is the official importer of BMW and MINI cars in Georgia.   Situation The top managers of Omega Motors decided to move to a new email server, which would enabl...

EFES Kazakhstan migrates the IT infrastructure components to Microsoft Azure
5.0
31.05.19

About the customer Efes Kazakhstan is the leader of the Kazakhstani beverage market in terms of production and sales and is part of the Anadolu Efes multinational beverage group. The company owns two beer plants in Almaty and Karaganda. Business Situation Efes Kazakhstan required a relia...