Product / Solution

  • Home>
  • Product / Solution
  • All

  • Hard

  • SaaS

  • Soft

  • Virtual

Products

Private Cloud File Sharing

Meet stringent data security and data residency requirements while benefitting from sharing and collaboration with ecosystem partners. Maintain sole control of encryption keys to ensure that data is always in your custody.

Seamless External Collaboration

Enhance business agility and accelerate time-to-value by enabling employees to collaborate with ecosystem partners, vendors, and customers easily and efficiently.

Secure Access Across All Devices

Achieve BYOD security and compliance while enhancing user productivity with native mobile apps designed for the enterprise. Enable leak-proof editing on mobile devices to protect data, leveraging a secure container.

Secure BYOD Solutions

Access and collaborate securely with enterprise content from any mobile device – without a VPN.

Single Pane of Glass View

Enable centralized access to multiple on-premises and cloud-based content systems through a unified, “single-pane-of-glass” view, from any device and any location. Without a VPN.

Application Services

Help ensure authenticity of every user to every application through integrated Single Sign-on, Multi-factor Authentication, Workflow and Lifecycle Management and Mobility Management capabilities. Verifying the User is a core pillar within Centrify’s Zero Trust Security approach and centers around the notion that the identity of every user needs to be verified before granting access to a resource. Application Services supports both internal users (employees, contractors) and external users (partners, customers).

Endpoint Services

Protect corporate resources and data through a zero trust security approach. Verify identity of users and endpoints with adaptive MFA, conditional access and analytics that govern how, when and what users have access to. Bolster endpoint security with cross-platform policy enforcement, powerful host-based privilege management, session recording and logging for IT and end-users.

Infrastructure Services

Minimize the attack surface and control privileged access to the hybrid enterprise with just-in-time and just enough privilege, identity assurance and advanced monitoring and reporting.

ClearDB Documenter

ClearDB Documenter is an ultimate solution to document Oracle Databases, incorporating strong code analysis features along with the security audit engine.

ClearSQL

ClearSQL is an automated code review and quality control tool for Oracle PL/SQL.

SQLDetective

All-in-one SQLDetective is an award-winning IDE tool for development, management, and administration of Oracle Databases up to 12c.

ClassiDocs™

ClassiDocs™,  our  award-winning  data classification and governance product, is integral to our solution platform. Once deployed, it scans, inventories, and classifies your entire data estate –  including  all  end  points,  servers,  network attached storage, storage area networks, cloud storage,  and  databases  –  according  to  your corporate policies and security parameters.

While standard classification protocol calls for a three step process that inventories, categorizes, and secures data, ClassiDocs pushes beyond the standard by applying machine learning and end user  feedback  to  classify  data  as  it  is  created, across  every  data  point.  This  empowers  data creators to define and augment the classification process,  while  the  product’s  inherent machine-learning  technology  continuously validates, refines, and updates classification as data moves within your organization.

ClassiDocs powers the inventory and classification of explicit and specific identifiers across  all  data  repositories,  structured  and  unstructured,  so  that  scattered  data points  can  be  funneled  into  a  complete,  timely  response  for  purposes  such as  discovery  and  compliance.  For  example,  critical  response  to  12  of  the  most important  GDPR  articles  is  fast-tracked  via  the  product’s  robust,  simple-to-use workflow that allows full customization, search, and remediation based on personal identifiable information (PII).

FlowMon ADS

Flowmon Anomaly Detection System is a modern detection system of the network attacks,anomalies, advanced persistent threats and undesirable behavior in the network.

FlowMon APM

FlowMon APM agent-less monitoring of all user transactions. Designed for web-based HTTP/HTTPS, MSSQL, Oracle applications.

FlowMon Collector

Flowmon Collector provides absolute control over the bandwidth utilization, optimization of network/application performance, quick troubleshooting and network protection against modern cyber threats.

FlowMon DDoS Defender

Due to their destructive nature and ability to affect networks with ease DDoS attacks have become especially worrisome to any business running web applications. Flowmon DDoS Defender puts advanced artificial intelligence between your critical systems and criminals. Without any changes in infrastructure, in a matter of minutes, network and security engineers will have up-and-running active DDoS protection.

FlowMon Monitoring Center

Flowmon monitoring center (FMC) is a professional tool for effective NetFlow statistics analysis. It is optimized for storing and processing high amounts of statistical data.

FlowMon Network Solution

A fast, reliable and well secured network is of crucial importance to any organization. Flowmon is the answer to this challenge using leading edge IP flow monitoring technology (NetFlow, IPFIX) to give you the best solution for network visibility.

FlowMon Probe

FlowMon Probe provides a statistical data needed for monitoring and network security, troubleshooting, IP-Billing and accounting, capacity planning, users and application control e.t.c.

FlowMon Traffic Recorder

FlowMon Traffic Recorder extends the functionality provided by the probe in the data stream recording area including a data content.

ForeScout CounterACT

ForeScout CounterACT allows IT organizations to readily understand and control how all users, systems and devices, including mobile devices and VMs, access network resources and applications.

Endpoint Manager powered by LANDESK

Do more than keep your business up and running.

Ivanti Application Control

Patching is the first step to reducing the risk of ransomware and other malware.

Ivanti Desktop and Server Management

A typical IT organization today must support at least four different operating environments, each with unique configurations, applications, services, and security protocols.

Ivanti DesktopNow Plus

Ivanti DesktopNow Plus powered by AppSense is a workspace management solution that helps you simplify desktop deployment and administration, reduce IT costs and secure endpoints.

Ivanti Device Control

To enhance productivity, you need to provide your users easy access to data, often outside the network.

Ivanti Environment Manager

Ivanti Environment Manager, powered by AppSense, makes the dream a reality with on-demand personalization and fine-grained, contextual policy control.

Ivanti IT Asset Management (ITAM) Suite

Ivanti IT Asset Management (ITAM) Suite, encompasses three key IT asset management solutions.

Ivanti Patch for Endpoint Manager

With compliance mandates galore and third-party apps rife with vulnerabilities, comprehensive patch management is a must.

Ivanti Patch for Windows

Many organizations juggle separate tools to patch physical and virtual servers—taking on the extra time and resources and increased risk of human error that entails.

Ivanti Service Manager

Ivanti Service Manager, powered by HEAT, is the most affordable, flexible and complete cloud-optimized ITSM solution available.

Ivanti Xtraction

You wrestle separate IT systems and cross-reference data manually—all for one report.

Security for Endpoint Manager (Ldms)

Malware relies on users doing dumb stuff—which of course they will. You can also count on attacks continuing to grow and evolve.

LogPoint SIEM

The LogPoint SIEM solution extracts events and incidents from the billions of logs existing in any IT infrastructure of any size

MobileIron Access

Simple and smart security for the enterprise cloud

MobileIron Threat Defense

Protect your company from future cyber attacks

MobileIron Unified Endpoint Management

Secure mobile innovation delivered to the enterprise edge

NETconsent Compliance Suite

The foundation for good governance

OneSpan Authentication Server

OneSpan Authentication Server offers strong authentication and validation of transaction signatures to address the need for e-signatures in commercial and banking applications.

OneSpan Mobile Authenticator

OneSpan Mobile Authenticator is a mobile, two-factor authentication app that enables users to securely login to applications, via their mobile device, with a simple fingerprint, FaceID or PIN along with a one-time password (OTP).

8MAN

8MAN is a fully integrated software solution for the management of Active Directory, file server and SharePoint access rights. Limit access rights to a “need to know” basis thereby significantly reducing data security risks. Ensure accountability and compliance with internal policies by knowing who touched which files.

Enterprise messaging

Teamwire is a fast and easy to use app to serve all enterprise messaging needs. The app provides a compelling set of features to improve the communication with colleagues and teams. Users can send 1:1 and group messages, post status updates to teams, exchange video and voice messages, and share files, calendar dates, photos and much more.

Veriato 360

Veriato 360 is comprehensive user-based Activity Monitoring software that allows IT professionals, Human Resources, Legal Counsel, and General Managers to monitor, replay, and analyze all user, department, and division electronic activity.

Veriato INVESTIGATOR

Veriato INVESTIGATOR automatically records emails, chats, instant messages, web sites visited, and more on Windows-based servers, PCs, and laptops.

Veriato Recon

Veriato Recon is User Behavior Analysis Software that provides early warning of suspicious behavior by passively monitoring user behavior and alerting when actions contradict policies or vary from well-defined patterns.

WORKSPAD

WorksPad is the  integrated enterprise mobile workplace with a unique to mobile world all-in-one approach. It provides an access to corporate file and document resources, file sync & share with editing capabilities, corporate email, contacts and corporate address book, calendars, intranet and internet browsing - all in one application on iOS or Android mobile devices, with enterprise-grade security. With WorksPad by MobilityLab LLC you can perform the same daily office tasks but wherever you like or need in highly productive and secure way.

WORKSPAD FOR MOBILEIRON

WorksPad for MobileIron provides mobile workers on iOS and Android devices with an integrated enterprise-grade workplace, which incorporates in one mobile application an access to corporate file and document resources, file sync & share with editing capabilities, corporate email, corporate address book, calendars, intranet and internet browsing and utilize he full power of AppConnect technology by MobileIron for ultimate manageability and security for enterprises.

Go to regional site
OK (Redirect in 3 sec)
Cancel

headtechnology UA

Levanevskogo Str., 6, office 79

03058 Kiev, Ukraine

tel.: +38 044 353 30 20

fax: +38 044 457 85 41

mail: info@headtechnology.com.ua