Resources

0 FILES click to send request

By Type

  • Blue Coat
    • Blue Coat Systems is a leading provider of Web security and WAN optimization solutions. Blue Coat offers solutions that provide the visibility, acceleration and security required to optimize and secure the flow of information to any user, on any network, anywhere. Founded in 1996, Blue Coat provides products to more than 15,000 customers worldwide, including 88% of the Fortune Global 500.

      Blue Coat CacheFlow

      The Blue Coat CacheFlow appliance enables service providers like you to manage dramatic increases in network traffic and subscriber growth. Utilizing highly effective Web caching technology, CacheFlow appliances save bandwidth on expensive international links and backhaul traffic, while improving the end-user Web experience. Through a scalable architecture of cache farms, service providers can accelerate the delivery of rich Web 2.0 content, large files and video. This significantly reduces infrastructure costs by controlling bandwidth consumption while improving customer satisfaction.

      Blue Coat Case Study: "Mobile TeleSystems"

      Mobile TeleSystems OJSC – MTS for short – is the leading telecommunication solutions provider in offering mobile and fixed voice, broadband, pay TV as well as content and entertainment services in one of the world‘s fastest growing regions. Including its subsidiaries, as of December 31, 2011, the group serviced over 100 million mobile subscribers in Russia, Ukraine, Uzbekistan,...

      Blue Coat Case Study: "TNT"

      Background TNT N.V., through its two divisions, Express and Mail, is part of the global transportation and distribution industry, and dedicated to providing delivery solutions to its customers. The global transportation and distribution business is a vast industry which is estimated to be worth over US$3,500 billion. TNT serves more than 200 countries and employs around 160,000 people. Over 2009...

      Blue Coat Cloud Service

      The Web Security Module of the Blue Coat Cloud Service provides market-leading web protection to organizations of all sizes without updating appliances, servers or user desktops. The Web Security Module is an Internet-delivered service that leverages Blue Coat’s proven technology and collaborative, cloud-based community of over 70 million users to ensure real-time protection against known and unknown web-borne threats. With extensive web application controls and detailed reporting features, the Web Security Module enables administrators to create and enforce granular policies that are instantly applied to all covered users, including fixed locations and roaming users.

      Blue Coat Data Loss Prevention

      Blue Coat Data Loss Prevention (DLP) enables you to detect and block potential data leaks quickly and accurately, all while achieving industry and regulatory compliance and risk mitigation objectives. Blue Coat DLP can help you maintain comprehensive security policies with minimal management overhead. You can also leverage powerful discovery capabilities to identify sensitive and unsecured information on your network before it gets into the wrong hands. With Blue Coat, you can quickly and easily deploy and maintain enterprise-class data loss prevention as a separate product or as part of the Blue Coat Application Delivery Network. As a result, you can achieve the right balance between your productivity, cost and security requirements.

      Blue Coat FileThreat BLADE

      Blue Coat ThreatBLADES deliver a comprehensive solution that integrates with the award-winning Security Analytics Platform by Solera, a Blue Coat Company and Blue Coat Malware Analysis Appliance to unify blocking and enforcement, big data security analytics, threat intelligence and security visibility

      Blue Coat Labs Report: Advanced Persistent Threats

      Advanced Persistent Threats (APTs) are well-researched and highly coordinated attacks designed to circumvent technical, procedural and user training defense mechanisms. Unlike mass-market malware attacks, APTs are not crimes of opportunity. They are targeted, specialized attacks against specific organizations or groups, and typically blend a broad range of common malware, phishing, hacking, spying and other tools together in a well-orchestrated operation

      Blue Coat MACH5

      Blue Coat MACH5 delivers the flexibility, power and speed you need for today’s business critical applications. By combining specialized optimization features, including protocol acceleration, compression, caching and QoS, MACH5 dramatically improves the performance of file transfers, backups, email, databases, video, and cloud applications. And MACH5 is uniquely able to deliver this performance across an IPv4 or IPv6 environment. MACH5 deploys at the network core and at the branch to assure every user, everywhere experiences the application performance they expect.

      Blue Coat MailThreat BLADE

      Blue Coat ThreatBLADES deliver a comprehensive solution that integrates with the award-winning Security Analytics Platform by Solera, a Blue Coat Company and Blue Coat Malware Analysis Appliance to unify blocking and enforcement, big data security analytics, threat intelligence and security visibility.

      Blue Coat PacketShaper

      Unmatched auto-detection of both applications and Web content categories makes Blue Coat PacketShaper a complete visibility and control solution for today’s Web-heavy traffic. PacketShaper lets you measure network application performance, categorize and manage Web traffic based on its content, guarantee quality-of-service (QoS) for preferred applications and content, and contain the impact of undesirable traffic.

      Blue Coat ProxyAV

      Blue Coat ProxyAV offers advanced malware detection at the gateway as part of the Application Delivery Network (ADN) infrastructure that provides complete application visibility, acceleration and security. ProxyAV appliances are designed for use with Blue Coat ProxySG Full Proxy appliances to provide in-line threat protection and malware scanning of Web content at the gateway, as part of Blue Coat’s layered security defense. The unique, high-performance architecture of ProxyAV combined with leading anti-malware engines efficiently secure Web traffic and protect users from Web-based malware. Together, ProxyAV and ProxySG provide superior performance and the lowest hardware footprint, resulting in a more green and cost-effective solution. Protect your users and network from viruses, Trojans, worms, spyware and other forms of malicious content — even extending protection to users who are not running anti-virus software.

      Blue Coat ProxyClient

      As part of the Application Delivery Network (ADN), Blue Coat ProxyClient secures remote users and small branch offices from today’s rapidly evolving Web threats, while accelerating network applications up to 35 times for greater productivity. Leveraging Blue Coat’s Acceleration Edition technology, ProxyClient delivers email, critical file transfers, and networked applications with LAN-like performance. And ProxyClient works with Blue Coat WebPulse cloud service to mitigate threats from malicious Web content, social networking, manipulated search engine results and even the dynamic links placed on popular Web sites by injections or other attacks.

      Blue Coat ProxySG

      Blue Coat ProxySG Full Proxy Edition appliances are the foundation of an Application Delivery Network (ADN) that provides complete application visibility, acceleration and security. To support the ADN, ProxySG delivers a scalable proxy platform architecture to secure Web communications and accelerate the delivery of business applications. ProxySG enables flexible policy controls over content, users, applications and protocols and is the choice of more than 80% of the Fortune Global 500.

      Blue Coat Reporter

      Blue Coat Reporter gives managers powerful visibility into all web-related user activity. Beyond URL filtering, Reporter provides customizable, at-a-glance dashboards and reports along with intuitive drill-down capabilities making it an invaluable part of security, compliance, bandwidth management, and other business critical efforts necessary in today’s competitive environment. Reporter quickly processes robust log data from Blue Coat ProxySG, WebFilter, ProxyClientTM, and ProxyAVTM, and creates intuitive reports for security specialists, department managers, HR managers, and network administrators. Blue Coat Reporter provides the ultimate solution for complete Web visibility and control.

      Blue Coat WebThreat BLADE

      Blue Coat ThreatBLADES deliver a comprehensive solution that integrates with the award-winning Security Analytics Platform by Solera, a Blue Coat Company and Blue Coat Malware Analysis Appliance to unify blocking and enforcement, big data security analytics, threat intelligence and security visibility.

      K9 web protection

      Blue Coat K9 Web Protection is a content filtering solution for your home computer. It implements the same reliable Web filtering technology used world wide by enterprise and government customers, providing a user-friendly experience that allows you to control Internet use in your home.

      Security Analytics Appliances

      Integrated and pre-installed with Solera Security Analytics Software, Security Analytics Appliances are the industry’s standard for delivering Big Data security analytics and advanced threat protection.

      Security Analytics Software

      The industry’s first and only software-based solution for Big Data Security, delivering unprecedented visibility and threat detection on industry-leading hardware.

      Security Analytics Virtual Appliance

      The first and only virtual appliance for Big Data security analytics, delivering unprecedented visibility and threat detection for any virtual environment.

      The Benefits of a Hybrid Security Architecture

      Cloud computing has become a viable model for a multitude of IT requirements. In some cases, large organizations purchase cloud-based CPU cycles on an as-needed basis for test, development, and batch processing using Infrastructure-as-aService (IaaS) offerings from vendors like Amazon, Rackspace, and Terremark. Other times they simply outsource an entire application, handing email to Google, CRM to Salesforce.com, or payroll to ADP.

      The WebPulse Collaborative Defense

      With WebPulse we have the mechanism to share intelligence contributed anonymously into the cloud, and deliver more accurate ratings and protection, more rapidly, back to the community that uses Blue Coat web security products powered by WebPulse.

  • Catbird
    • Catbird® is a pioneer and leader in Software-Defined Segmentation and Security for the Hybrid IT Infrastructure. Catbird’s software suite of products was designed from the ground up to provide visibility into and protection of private clouds and virtual Data Centers, and is available for both VMware and OpenStack.

      Auditor Reviewed PCI Solution Guide for Compliance Monitoring

      The Catbird PCI Solution Guide augments the native security offerings in VMware vCloud Suite 5.1 to cover additional control areas required for PCI compliance, enabling retailers to accelerate and simplify the transition of mission critical operations to virtualized data centers.

      Carbird Case Study: "Thomaston Savings Bank"

      Thomaston was already using Catbird to protect its physical networks from attack, Now Catbird vSecurity is deployed throughout Thomaston’s virtualized data center.

      Catbird vSecurity Datasheet

      Catbird vSecurity incorporates the broadest set of controls required to meet the seven areas of interest to the auditors. Together, these capabilities are at the core of Catbird's automated security compliance monitoring and enforcement.

  • Centrify
    • Centrify delivers integrated software and cloud-based solutions that centrally control, secure and audit access to cross-platform systems, mobile devices and applications by leveraging the infrastructure organizations already own - Microsoft Active Directory. From the data center and into the cloud, more than 4,000 organizations, including 40 percent of the Fortune 50 and more than 60 Federal agencies, rely on Centrify’s identity consolidation and privilege management solutions to reduce IT expenses, strengthen security and meet compliance requirements.

      Centrify DirectAudit

      Centrify DirectAudit enables detailed, real-time auditing of privileged user sessions on Windows, UNIX and Linux systems providing a full accounting of user activity and system access. DirectAudit’s detailed capture of historical user activity establishes accountability and strengthens compliance reporting by recording user access to systems, specific commands and privileges used and the exact modifications to key files and configurations that were made. With DirectAudit enterprises can closely monitor IT contractors and offshore workers, pinpoint suspicious activity through real-time monitoring and troubleshoot system failures by replaying actions for root-cause analysis.

      Centrify DirectAuthorize

      Centrify DirectAuthorize centrally manages and enforces role-based entitlements for fine-grained control of user access and privileges on UNIX and Linux systems.

      Centrify DirectControl

      Centrify DirectControl centrally secures privileged user access to cross-platform systems and applications by leveraging Active Directory.

      Centrify DirectSecure

      Secures sensitive information by dynamically isolating cross-platform systems and encrypting data in motion

      Centrify Express for Mobile

      Centrify Express for Mobile is a free version of easy-to-deploy, cloud-based service that lets to centrally secure and manage smart phones and tablets using Active Directory.
      Download directly from vendor web-page.

      Centrify Express for SaaS

      Centrify Express for SaaS is a free version of our easy-to-deploy service that delivers single sign-on to cloud-based apps while letting IT centrally control access using Active Directory.
      Download directly from vendor web-page.

      Centrify Express for UNIX, Linux & Mac

      Centrify Express for UNIX and Linux provides identity and access control for cross-platform data centers using Active Directory.

      Download directly from vendor web-page.

      Centrify Suite

      Centrally control, secure and audit access to cross-platform systems, mobile devices and applications.

  • ForeScout
    • ForeScout Technologies, Inc. is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of January 2016, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

      ForeScout Case Study: "Austrian Post AG"

      Austrian Post AG Deploys ForeScout CounterACT to Secure Head Office And Multiple Networks. Austrian Post is the leading logistics and postal services provider in Austria. Approximately 23,000 staff work at Post AG within its head office, six parcel distribution centers and seven mail distribution centers, 1,250 franchise partners, 275 service bases and 620 customer branches. The head office had difficulty meeting security requirements because it had several entrances that were difficult to monitor. There was a risk that unauthorized persons might enter the building and gain access to the IT infrastructure.

      ForeScout CounterACT

      ForeScout CounterACT allows IT organizations to readily understand and control how all users, systems and devices, including mobile devices and VMs, access network resources and applications.

      ForeScout MDM

      ForeScout MDM helps IT administrators streamline the process to provision, manage and secure today’s expanding suite of smartphones and tablets, all from a single portal. ForeScout MDM for mobile devices is an easy to use platform that includes all of the essential functionality for end-toend management of iOS, Android, BlackBerry, and Windows Phone devices.

      ForeScout Mobile

      ForeScout Mobile is the easiest, most #exible way for IT security managers to say “yes” to personal mobile devices on the enterprise network without compromising security. ForeScout Mobile works with ForeScout’s leading network access control (NAC) platform, ForeScout CounterACT, to provide real-time visibility and control of everything on the network— wired and wireless, managed and unmanaged, PCs and handheld devices.

      ForeScout NAC

      Continuous Monitoring and Remediation capabilities extend the power of CounterACT as an automated security control platform for greater IT responsiveness and compliance assurance.

  • HEAT Software
    • HEAT Software, Inc., a global leader in operational endpoint security, develops, integrates and markets security software solutions helping companies to protect their vital information and manage critical risk across network and endpoint assets. HEAT Software enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint- and Data Protection, Reporting and Compliance offerings.

      Lumension AntiVirus

      Lumension AntiVirus provides advanced protection via traditional signature-matching capabilities as well as innovative DNA Matching, SandBox and Exploit Detection technologies which provide proactive protection against zero-day threats.

      Lumension Application Control

      Lumension Application Control provides complete malware protection and increases IT and end-user productivity by preventing any unknown, un-trusted or malicious applications from executing.

      Lumension Application Scanner

      Download Lumension Application Scanner today to discover what applications are running within your network. Unwanted and unauthorized applications can introduce malware, decrease performance, consume disk space, waste network bandwidth and even slow user productivity. The Lumension Application Scanner identifies the presence of all Windows applications installed on a specific computer or domain that you administrate. Utilizing an intuitive user interface, users can easily create a variety of HTML reports about application information, including application name, vendor and host. Click here to watch the video!

      Lumension Case Study: "ANTONOV ASTC"

      ANTONOV Aeronautical Scientific/Technical Complex was founded in 1946. Since then, more than one hundred types and modifications of aircraft of various classes and purposes have been designed. Today ANTONOV ASTC has a highly experienced collective, Design Bureau, wide complex of laboratories, experimental plant and the Flight and Test base which make it possible to solve any task on aircraft development including its certification, as well as co-operation in field of manufacture, operational support and follow-on of all the Antonov aircraft types.

      Lumension Case Study: "Fozzy Group"

      It's no secret that the lion's share of leaks, loss and intentional theft of corporate data is through removable media. That is why the Fozzy Group decided to implement a solution Lumension Device Control for control of ports and access control personnel to removable drives.

      Lumension Case Study: "Oranta"

      Oranta National Joint Stock Insurance Company
      Continuously operating since 1921, Oranta stands as the largest insurer in the Ukraine for everything from cars to personal liability, marine and construction risk, etc.

      Lumension Data Protection Solution

      Prevent Data Loss and Theft by Enforcing Removable Device Usage and Data Encryption Policies. In today’s global 24x7 business environment, organizations need real-time access to information - balancing this with the associated risks is key to ensuring data is not lost or stolen and business productivity is not diminished. Lumension Data Protection automates the enforcement of data and device usage policies across the entire network and enforces encryption policies for sensitive data being copied to removable devices.

      Lumension Device Control

      Lumension Device Control is an award-winning leader in preventing data loss / theft via removable devices / media. With Lumension Device Control, organizations can quickly identify all endpoint-connected devices in their environment and flexibly enforce a comprehensive security policy that prevents unauthorized use, limits malware intrusion, and forces encryption of sensitive data.

      Lumension Endpoint Management and Security Suite

      Lumension Endpoint Management and Security Suite unifies the functions of IT operations and security through a single console, server and agent architecture to seamlessly and more effectively address IT risk and systems management requirements across the enterprise. Lumension Endpoint Management and Security Suite delivers best-in-class, modularly licensed capabilities across patch management, anti-virus, configuration management, power management, application control, device control and asset management.

      Lumension Intelligent Whitelisting

      More Effective, Flexible and Easy-to-Manage Endpoint Security that Reduces Malware Risk and Endpoint TCO - Without Impacting Business Productivity. In today’s dynamic threat environment, organizations are increasingly vulnerable to sophisticated and targeted malware attacks from financially-motivated cybercriminals. To meet the demands of the new environment, organizations must ensure better centralized control over endpoint configurations to improve their security posture, without impacting end-user productivity.

      Lumension Patch and Remediation

      Lumension Patch and Remediation streamlines and automates the patch management process in even the most complex, heterogeneous environments. Through proactive alerting on issues, you can address them immediately.

      Lumension Risk Manager

      Lumension Risk Manager automates compliance and IT risk management workflows and by providing necessary visibility of people, processes and technology across the entire organization to measure and report against internal and external mandates.

      Lumension Scan

      Lumension Scan, a component of Lumension Vulnerability Management, is a complete stand-alone, network-based scanning solution that performs a comprehensive external scan of all devices connected to your network, both managed and unmanaged.

      Lumension Vulnerability Management

      Integrated, Proactive Software Vulnerability Assessment and Patch Management. As more IT organizations are supporting heterogeneous environments with increasingly diverse operating systems and applications, they need an automated and streamlined vulnerability management solution to simplify and expedite the process. Lumension Vulnerability Management enables enterprises to effectively manage the entire vulnerability lifecycle utilizing automated vulnerability assessment, patch management and remediation.

      Lumension Vulnerability Scanner

      Operating Systems, applications and mis-configured systems can introduce vulnerabilities on your network. The Lumension Vulnerability Scanner assesses and prioritizes your vulnerabilities by criticality and delivers actionable information through an intuitive user interface, where users can easily create a variety of PDF-based reports about vulnerabilities for your OS, applications, policies and security configurations.

  • MobileIron
    • MobileIron was purpose-built to secure and manage mobile apps, data, and devices for global companies. MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy controls. Positioned in the Leaders Quadrant of Gartner, Inc.'s Magic Quadrant for Mobile Device Management Software 2011, MobileIron is solving the problems CIOs face as business data and applications move to smartphones and tablets. The MobileIron Virtual Smartphone Platform and the MobileIron Connected Cloud are the first solutions to give IT and users real-time intelligence and control over mobile content, activity, and apps in order to secure the enterprise, reduce wireless cost, and improve the mobile user experience.

      MobileIron Connected Cloud

      The MobileIron Connected Cloud is a mobile device management solution that can be fully integrated and operational in less than an hour. Once this step is done the IT can begin bringing mobile devices in management and distributing mobile apps using MobileIron’s Enterprise App Storefront, without losing enterprise-grade security. The MobileIron Connected Cloud gives companies around the world a highly scalable infrastructure enabling the IT to support everything from initial pilots to tens of thousands of devices.

      MobileIron Docs@Work

      The challenge for the Mobile IT team is to provide a great user experience when accessing enterprise content on their mobile device without sacrificing document security.

      MobileIron for Android

      MobileIron’s advanced security and app management capabilities allow organizations to expand their Android mobile deployments from knowledge worker and BYOD settings to more rigorous regulated and app-centric use cases.

      MobileIron for iOS

      MobileIron was the pioneer of iOS in the enterprise, delivering the platform’s first private app storefront, BYOD privacy controls, and certificate-based identity management.

      MobileIron Virtual Smartphone Platform

      The MobileIron Virtual Smartphone Platform is the first solution to combine data- driven smartphone and tablet management with real-time wireless cost control.

      MobileIron Web@Work

      The Web@Work Enterprise Mobile Browser enables immediate, secure access to internal websites and web applications, while preserving a native and high-fidelity web browsing experience.

  • Mojo Networks
    • Mojo Networks is the global leader in wireless security and compliance solutions. Mojo's patented technology protects enterprises from the growing problem of Wi-Fi security threats, while allowing organizations to better manage their WLAN environment and comply with emerging wireless compliance standards (i.e. PCI). The Company's award-winning SpectraGuard wireless intrusion prevention solution (WIPS) family provides enterprise security and compliance professionals with unparalleled capabilities to accurately detect, classify, block and locate all Wi-Fi security threats, while helping network operations staff to quickly monitor and troubleshoot WLAN performance issues.

      AirTight Planner

      Quickly Plan for Wireless LAN Coverage Planning a wireless LAN network can be a time consuming endeavor involving a manual site survey process, marking up floor plans, and tedious recording of the measurement data at each step of the way. Invisibility and the uncertainty of RF propagation can make wireless LAN planning a complex task, especially as the size of wireless LAN deployments are increasing. With AirTight Planner, the job becomes much easier.

      AirTight Secure Wi-Fi Key Datasheet

      AirTight Secure Wi-Fi provides detection and prevention of rogue access points (APs) and other wireless vulnerabilities to satisfy PCI compliance requirements today while laying the foundation for strategic wireless initiatives in the future.

      AirTight SpectraGuard SAFE

      SpectraGuard SAFE - is wireless security agent for endpoints that protects mobile clients from Wi-Fi threats – 24 x 7, wherever they are.

      Don’t Let Wireless Detour Your PCI Compliance

      This white paper helps those organizations understand how the PCI DSS 1.2 wireless requirements apply to them, how to meet those requirements in a cost effective way, and how to secure your network and cardholder data from wireless threats.

      SpectraGuard Enterprise

      AirTight's SpectraGuard Enterprise wireless intrusion prevention system (WIPS) provides enterprises with continuous and the most comprehensive protection against current and emerging wireless threats.

      Wireless Forensics at Your Fingertips - Smart Forensics™

      Network administrators and incident handlers are faced with the complexity of managing and responding to the growing number of wireless LAN (WLAN) hacking incidents, unauthorized devices and misbehaving end-users. Wireless forensics — the ability to collect and analyze wireless data traffic to decipher what, when and how an incident happened — holds the key to be able to respond swiftly to a security breach or wireless vulnerability.

  • Proofpoint
    • Proofpoint is a pioneering security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information.

      Proofpoint CloudControl

      The Proofpoint CloudControlplatform leverages the cloud to deliver applications focused on security, privacy, and litigation. Proofpoint’sproducts are powered by Proofpoint CloudControl in order to meet the demands of enterprise customers who arelooking to reduce their operating expenses without having to sacrifice security, control, flexibility or scalability.

      Proofpoint Dynamic Reputation

      The Proofpoint Enterprise Protection Suite includes the industry’s most powerful connection management features, powered by Proofpoint Dynamic Reputation. Proofpoint Dynamic Reputation is the only email reputation service that uses a combination of local data and global reputation—analyzed by powerful machine learning algorithms—to block connections from malicious IP addresses. Proofpoint Dynamic Reputation provides enterprises with an accurate, first line of defense against spam, directory harvest, denial-of-service and other email-borne attacks, while delivering substantial bandwidth savings. Proofpoint Dynamic Reputation provides additional spam protection against botnets, and reduces the sheer volume of connections hitting any type of Proofpoint deployment.

      Proofpoint Enterprise Archive

      Proofpoint Enterprise Archive is an on-demand archiving solution that addresses three key challenges – legal discovery, regulatory compliance, and email storage management – without the headaches of managing archiving in-house.

      Proofpoint Enterprise Governance

      Proofpoint Enterprise Governance Suite is an information governance solution that provides organizations the ability to monitor and apply policy to unstructured information—wherever it exists across the enterprise. By proactively governing unstructured information “in-place,” organizations can effectively protect brand and manage regulatory compliance, security, and confi dentiality.

      Proofpoint Enterprise Privacy

      The Proofpoint Enterprise Privacy suite provides a full lifecycle approach to protecting information of all types.

      Proofpoint Enterprise Protection

      Proofpoint Enterprise Protection delivers everything needed to keep an organization safe from email threats bytaking a full lifecycle approach to securing email.

      Proofpoint Secure File Transfer

      Proofpoint Secure File Transfer provides secure, large file transfer capabilities that allow users to send large files quickly, easily and securely, while removing the impact of large attachments on an email infrastructure. Proofpoint Secure File Transfer enables increased user productivity and better management of email attachments—and ensures minimum impact on senders, recipients, and IT—while enabling the secure, easy touse transfer of large files.

      Proofpoint Spam Detection

      Proofpoint Spam Detection, included in the Proofpoint Enterprise Protection™ Suite, delivers the most powerful and accurate approach to detecting and eliminating spam and phishing attacks in any language. Proofpoint has combined the most effective spam filtering methods with its breakthrough Proofpoint MLX machine learning technology to deliver the industry’s highest spam effectiveness, greater than 99.8%, and lowest rate of false positives.

      Proofpoint Targeted Attack Protection

      Proofpoint Targeted Attack Protection provides the tools to keep an organization safe from the malicious nature of targeted spear-phishing attacks and is a natural complement to any existing email security gateway.

  • protected-networks.com
    • protected-networks.com provides Access Governance. The company sees its strengths in the development of a homogenous and integrated solution, which combines several functionalities and changes the way in which Active Directory and file server access rights management is traditionally approached. New ways of presenting information, enabling documentation and allowing administration of access rights differentiate the solution from its competitors.

      8MAN

      Since access rights are as complex as the companies they represent, we decided to put our focus on the visualisation of access rights so that each company can get an understanding of its internal structure and complexity. This visualisation makes it easy for clients to understand the individual challenges and unique risk factors affecting their data security. The specially developed 8MAN graphical interface, ensures that permissions across all resources (Active Directory, File Server and SharePoint) are presented quickly and are clearly understandable.

  • VASCO
    • VASCO Data Security International Inc. is a world leader in Strong Authentication and e-Signature solutions, specializing in online accounts, identities, and transactions. As global software company, VASCO serves a customer base of approximately 9,000 companies in over 100 countries, including more than 1,300 international financial institutions. In addition to the financial sector, VASCO technologies secure sensitive information and transactions for the enterprise security, e-commerce, and e-government industries.

      VASCO DIGIPASS

      VASCO DIGIPASS provides strong user authentication and e-Signatures and is compatible with more than 50 international vendors for e-commerce, e-banking, e-networking and e-government applications.

      VASCO IDENTIKEY SERVER

      IDENTIKEY Server is an authentication software suite for organizations of all sizes that want to address their concerns about secure access with a state-of-the-art solution.

  • Veriato
    • Veriato (formerly known as SpectorSoft) is the recognized leader and pioneer in the computer, mobile device and Internet monitoring and analysis software market. More than 500,000 consumers and 50,000 businesses, government organizations, schools and law enforcement agencies have purchased Veriato products to help keep children and employees safe online, and to prevent Internet abuse, data loss and compliance violations in the workplace.

      SPECTOR 360

      SPECTOR 360 is comprehensive user-based Activity Monitoring software that allows IT professionals, Human Resources, Legal Counsel, and General Managers to monitor, replay, and analyze all user, department, and division electronic activ-ity.

      Spector 360 Cheat Sheet

      SpectorSoft develops, markets and supports PC/Internet monitoring and surveillance products for business, educaton, government and general home users. Our customers need to know how people are using their PCs and what they are doing on the Internet. SpectorSoft was founded to provide the first useful and intuitve recording and playback products for Windows and Mac OS based computers as well as mobile phones.

      Spector CNE Investigator

      Spector CNE automatically records emails, chats, instant messages, web sites visited, and more on Windows-based servers, PCs, and laptops.

      SpectorSoft Case Study: "ICB NIKOIL"

      Given the confidential nature of financial products and services, ICB NIKOIL management determined it required the ability to investigate possible incidents in the area of Information Security. Chief Information Security Officer Rasim Karimov said the institution also sought to exercise control over the use of employee computer resources, including day-to-day work applications and Internet access.

      SpectorSoft Case Study: "NIKOIL"

      SPECTOR 360 is convenient, easy to use, and its Dashboard intuitively understandable," said Karimov. "I use the Quick View reports most often. They allow us to evaluate the activity and workload of employees, and also permit us to easily create and view groups of favorite records.

Go to regional site
OK (Redirect in 3 sec)
Cancel

headtechnology UA

Levanevskogo Str., 6, office 79

03058 Kiev, Ukraine

tel.: +38 044 353 30 20

fax: +38 044 457 85 41

mail: info@headtechnology.com.ua

  • All

  • Hard

  • SaaS

  • Soft

  • Virtual