Product / Solution

  • Home>
  • Product / Solution
  • All

  • Hard

  • SaaS

  • Soft

  • Virtual

Non-profit organizations

GROUPED BY VERTICAL

Seamless External Collaboration

Enhance business agility and accelerate time-to-value by enabling employees to collaborate with ecosystem partners, vendors, and customers easily and efficiently.

Application Services

Help ensure authenticity of every user to every application through integrated Single Sign-on, Multi-factor Authentication, Workflow and Lifecycle Management and Mobility Management capabilities. Verifying the User is a core pillar within Centrify’s Zero Trust Security approach and centers around the notion that the identity of every user needs to be verified before granting access to a resource. Application Services supports both internal users (employees, contractors) and external users (partners, customers).

Endpoint Services

Protect corporate resources and data through a zero trust security approach. Verify identity of users and endpoints with adaptive MFA, conditional access and analytics that govern how, when and what users have access to. Bolster endpoint security with cross-platform policy enforcement, powerful host-based privilege management, session recording and logging for IT and end-users.

Infrastructure Services

Minimize the attack surface and control privileged access to the hybrid enterprise with just-in-time and just enough privilege, identity assurance and advanced monitoring and reporting.

ClearDB Documenter

ClearDB Documenter is an ultimate solution to document Oracle Databases, incorporating strong code analysis features along with the security audit engine.

FlowMon ADS

Flowmon Anomaly Detection System is a modern detection system of the network attacks,anomalies, advanced persistent threats and undesirable behavior in the network.

FlowMon APM

FlowMon APM agent-less monitoring of all user transactions. Designed for web-based HTTP/HTTPS, MSSQL, Oracle applications.

FlowMon Collector

Flowmon Collector provides absolute control over the bandwidth utilization, optimization of network/application performance, quick troubleshooting and network protection against modern cyber threats.

FlowMon DDoS Defender

Due to their destructive nature and ability to affect networks with ease DDoS attacks have become especially worrisome to any business running web applications. Flowmon DDoS Defender puts advanced artificial intelligence between your critical systems and criminals. Without any changes in infrastructure, in a matter of minutes, network and security engineers will have up-and-running active DDoS protection.

FlowMon Monitoring Center

Flowmon monitoring center (FMC) is a professional tool for effective NetFlow statistics analysis. It is optimized for storing and processing high amounts of statistical data.

FlowMon Network Solution

A fast, reliable and well secured network is of crucial importance to any organization. Flowmon is the answer to this challenge using leading edge IP flow monitoring technology (NetFlow, IPFIX) to give you the best solution for network visibility.

FlowMon Probe

FlowMon Probe provides a statistical data needed for monitoring and network security, troubleshooting, IP-Billing and accounting, capacity planning, users and application control e.t.c.

FlowMon Traffic Recorder

FlowMon Traffic Recorder extends the functionality provided by the probe in the data stream recording area including a data content.

ForeScout CounterACT

ForeScout CounterACT allows IT organizations to readily understand and control how all users, systems and devices, including mobile devices and VMs, access network resources and applications.

LogPoint SIEM

The LogPoint SIEM solution extracts events and incidents from the billions of logs existing in any IT infrastructure of any size

MobileIron Unified Endpoint Management

Secure mobile innovation delivered to the enterprise edge

8MAN

8MAN is a fully integrated software solution for the management of Active Directory, file server and SharePoint access rights. Limit access rights to a “need to know” basis thereby significantly reducing data security risks. Ensure accountability and compliance with internal policies by knowing who touched which files.

Veriato 360

Veriato 360 is comprehensive user-based Activity Monitoring software that allows IT professionals, Human Resources, Legal Counsel, and General Managers to monitor, replay, and analyze all user, department, and division electronic activity.

Veriato INVESTIGATOR

Veriato INVESTIGATOR automatically records emails, chats, instant messages, web sites visited, and more on Windows-based servers, PCs, and laptops.

WORKSPAD

WorksPad is the  integrated enterprise mobile workplace with a unique to mobile world all-in-one approach. It provides an access to corporate file and document resources, file sync & share with editing capabilities, corporate email, contacts and corporate address book, calendars, intranet and internet browsing - all in one application on iOS or Android mobile devices, with enterprise-grade security. With WorksPad by MobilityLab LLC you can perform the same daily office tasks but wherever you like or need in highly productive and secure way.

WORKSPAD FOR MOBILEIRON

WorksPad for MobileIron provides mobile workers on iOS and Android devices with an integrated enterprise-grade workplace, which incorporates in one mobile application an access to corporate file and document resources, file sync & share with editing capabilities, corporate email, corporate address book, calendars, intranet and internet browsing and utilize he full power of AppConnect technology by MobileIron for ultimate manageability and security for enterprises.

Go to regional site
OK (Redirect in 3 sec)
Cancel

headtechnology UA

Levanevskogo Str., 6, office 79

03058 Kiev, Ukraine

tel.: +38 044 353 30 20

fax: +38 044 457 85 41

mail: info@headtechnology.com.ua

  • All

  • Hard

  • SaaS

  • Soft

  • Virtual