Product / Solution

  • Home>
  • Product / Solution
  • All

  • Hard

  • SaaS

  • Soft

  • Virtual

Data Protection

GROUPED BY CATEGORY

Endpoint Services

Protect corporate resources and data through a zero trust security approach. Verify identity of users and endpoints with adaptive MFA, conditional access and analytics that govern how, when and what users have access to. Bolster endpoint security with cross-platform policy enforcement, powerful host-based privilege management, session recording and logging for IT and end-users.

Infrastructure Services

Minimize the attack surface and control privileged access to the hybrid enterprise with just-in-time and just enough privilege, identity assurance and advanced monitoring and reporting.

ClearDB Documenter

ClearDB Documenter is an ultimate solution to document Oracle Databases, incorporating strong code analysis features along with the security audit engine.

EgoSecure Data Protection

Access Control

  • Control and governance of access to external devices and client environment interfaces
  • Access permission to cloud services
  • Control of all data transmission paths
  • Control of network connections (e.g. WLAN, antibridging, USB network adapters)
  • BadUSB protective measures
  • File filter for blocking certain data formats
  • Whitelisting of external devices
  • Revision security according to Basel II, Sarbanes-Oxley, PCI conformity

Proofpoint Enterprise Governance

Proofpoint Enterprise Governance Suite is an information governance solution that provides organizations the ability to monitor and apply policy to unstructured information—wherever it exists across the enterprise. By proactively governing unstructured information “in-place,” organizations can effectively protect brand and manage regulatory compliance, security, and confi dentiality.

Proofpoint Enterprise Privacy

The Proofpoint Enterprise Privacy suite provides a full lifecycle approach to protecting information of all types.

Proofpoint Targeted Attack Protection

Proofpoint Targeted Attack Protection provides the tools to keep an organization safe from the malicious nature of targeted spear-phishing attacks and is a natural complement to any existing email security gateway.

Go to regional site
OK (Redirect in 3 sec)
Cancel

headtechnology UA

st. Glibochiskaya, 40, building N, P, office 19

04052 Kiev, Ukraine

tel.: +38 044 353 30 20

fax: +38 044 457 85 41

mail: info@headtechnology.com.ua

  • All

  • Hard

  • SaaS

  • Soft

  • Virtual