Product / Solution

  • Home>
  • Product / Solution
  • All

  • Hard

  • SaaS

  • Soft

  • Virtual

Malware Protection

GROUPED BY PURPOSE

Seamless External Collaboration

Enhance business agility and accelerate time-to-value by enabling employees to collaborate with ecosystem partners, vendors, and customers easily and efficiently.

FlowMon ADS

Flowmon Anomaly Detection System is a modern detection system of the network attacks,anomalies, advanced persistent threats and undesirable behavior in the network.

FlowMon APM

FlowMon APM agent-less monitoring of all user transactions. Designed for web-based HTTP/HTTPS, MSSQL, Oracle applications.

FlowMon Collector

Flowmon Collector provides absolute control over the bandwidth utilization, optimization of network/application performance, quick troubleshooting and network protection against modern cyber threats.

FlowMon DDoS Defender

Due to their destructive nature and ability to affect networks with ease DDoS attacks have become especially worrisome to any business running web applications. Flowmon DDoS Defender puts advanced artificial intelligence between your critical systems and criminals. Without any changes in infrastructure, in a matter of minutes, network and security engineers will have up-and-running active DDoS protection.

FlowMon Monitoring Center

Flowmon monitoring center (FMC) is a professional tool for effective NetFlow statistics analysis. It is optimized for storing and processing high amounts of statistical data.

FlowMon Network Solution

A fast, reliable and well secured network is of crucial importance to any organization. Flowmon is the answer to this challenge using leading edge IP flow monitoring technology (NetFlow, IPFIX) to give you the best solution for network visibility.

FlowMon Probe

FlowMon Probe provides a statistical data needed for monitoring and network security, troubleshooting, IP-Billing and accounting, capacity planning, users and application control e.t.c.

FlowMon Traffic Recorder

FlowMon Traffic Recorder extends the functionality provided by the probe in the data stream recording area including a data content.

Preventative Security Controls Across Endpoints

Secure endpoints used to access corporate resources with centralized policy management, providing device visibility (corporate or BYOD), insights, and consistent preventative security controls for iOS, Android, Mac and Windows endpoints.

Secure Remote Access with Dedicated Per-App Gateway

Eliminate VPN risk with encrypted, dedicated, per-app access.

Smart Cards and Derived Credentials

Enforce strong authentication via smart cards and derived credentials for access to Mac, mobile devices, and cloud and on-premises resources.

Go to regional site
OK (Redirect in 3 sec)
Cancel

headtechnology UA

Levanevskogo Str., 6, office 79

03058 Kiev, Ukraine

tel.: +38 044 353 30 20

fax: +38 044 457 85 41

mail: info@headtechnology.com.ua

  • All

  • Hard

  • SaaS

  • Soft

  • Virtual