Request Demo

  • Accellion
    • More than 15 million users and 2,500 of the world’s leading enterprises across multiple industry verticals like finance, healthcare, legal and government deploy Accellion to enable secure, seamless content collaboration among employees and external partners. They rely on Accellion to not only increase productivity, ensure data security and drive compliance, but also to deliver business agility to stay competitive. Positioned as a leader in the Forrester Wave™ for Hybrid EFSS Solutions, kiteworks by Accellion is a secure content collaboration platform that runs on private clouds, centralizes security controls and management, and extends existing content systems to external partners without having to migrate any content. kiteworks unifies access to multiple on-premises and cloud-based enterprise content systems with its “Single Pane of Glass View”, without requiring a VPN. Through its integration with Microsoft Office 365 web, mobile and desktop clients, users can directly create and open Microsoft Office documents right in the single pane of glass view—while edits automatically save back to the enterprise source system.

      Private Cloud File Sharing

      Meet stringent data security and data residency requirements while benefitting from sharing and collaboration with ecosystem partners. Maintain sole control of encryption keys to ensure that data is always in your custody.

      Seamless External Collaboration

      Enhance business agility and accelerate time-to-value by enabling employees to collaborate with ecosystem partners, vendors, and customers easily and efficiently.

      Secure Access Across All Devices

      Achieve BYOD security and compliance while enhancing user productivity with native mobile apps designed for the enterprise. Enable leak-proof editing on mobile devices to protect data, leveraging a secure container.

      Secure BYOD Solutions

      Access and collaborate securely with enterprise content from any mobile device – without a VPN.

      Single Pane of Glass View

      Enable centralized access to multiple on-premises and cloud-based content systems through a unified, “single-pane-of-glass” view, from any device and any location. Without a VPN.

  • Blue Coat
    • Blue Coat Systems is a leading provider of Web security and WAN optimization solutions. Blue Coat offers solutions that provide the visibility, acceleration and security required to optimize and secure the flow of information to any user, on any network, anywhere. Founded in 1996, Blue Coat provides products to more than 15,000 customers worldwide, including 88% of the Fortune Global 500.

      Blue Coat CacheFlow

      The Blue Coat CacheFlow appliance enables service providers to better manage excessive increases in network traffic and subscriber growth.

      Blue Coat Cloud Service

      Blue Coat Cloud Service delivers comprehensive web security as a service

      Blue Coat Data Loss Prevention

      Blue Coat Data Loss Prevention (DLP) enables you to detect and block potential data leaks quickly and accurately, all while achieving industry and regulatory compliance and risk mitigation objectives.

      Blue Coat MACH5

      Blue Coat MACH5 delivers the flexibility, power and speed you need for today’s business critical applications.

      Blue Coat PacketShaper

      Blue Coat PacketShaper delivers integrated visibility, control and compression capabilities in a single appliance.

      Blue Coat ProxyAV

      Blue Coat ProxyAV stops malware at the web gateway

      Blue Coat ProxyClient

      Blue Coat ProxyClient оptimizes application performance and security for remote workers. ProxyClient is a no-cost addition to your existing Blue Coat ProxySG infrastructure.

      Blue Coat ProxySG

      Blue Coat Full Proxy Edition of the ProxySG appliance family is part of Blue Coat’s Web security solutions that provides complete Web security and WAN Optimization. ProxySG delivers a scalable proxy platform architecture to secure Web communications and accelerate the delivery of business applications. ProxySG enables flexible, granular, policy controls over content, users, applications, web applications, and protocols.

      Blue Coat Reporter

      Blue Coat Reporter enables you to see all web-based user activities through dashboards and reports. Reporter supports up to 50 administrators, each with a custom dashboard. Reporter’s web API allows data, such as web usage patterns, bandwidth usage, application access summaries, blocked sites and more, to be exported into management consoles or reviewed by auditors using tools of their choice.

      Blue Coat WebFilter

      Blue Coat WebFilter Controls web access and stops the latest web threats in real time.

      Security Analytics Platform

      Security Analytics Platform from Blue Coat is easily deployed anywhere within your network—either as a pre-configured appliance, a virtual appliance, or software on your own hardware.


      Integrating directly into the Security Analytics Platform, the Blue Coat ThreatBLADES use a cloud-based threat intelligence infrastructure powered by the Blue Coat WebPulse Collaborative Defense Cloud—leveraging the collaborative ‘network effect’ of more than 75 million users.

  • FlowMon
    • Flowmon Networks empowers businesses to manage and secure their computer networks confidently. Through its high performance network monitoring technology and lean-forward behavior analytics, IT pros worldwide benefit from absolute network traffic visibility to enhance network & application performance and deal with modern cyber threats. FlowMon is leading the way of NetFlow/IPFIX network monitoring that is high performing, scalable and easy to use. With their solution recognized by Gartner, recommended by Cisco, Check Point and IBM, FlowMon is one of the fastest growing companies in the industry.

      FlowMon ADS

      Flowmon Anomaly Detection System is a modern detection system of the network attacks,anomalies, advanced persistent threats and undesirable behavior in the network.

      FlowMon APM

      FlowMon APM agent-less monitoring of all user transactions. Designed for web-based HTTP/HTTPS, MSSQL, Oracle applications.

      FlowMon Collector

      Flowmon Collector provides absolute control over the bandwidth utilization, optimization of network/application performance, quick troubleshooting and network protection against modern cyber threats.

      FlowMon DDoS Defender

      Due to their destructive nature and ability to affect networks with ease DDoS attacks have become especially worrisome to any business running web applications. Flowmon DDoS Defender puts advanced artificial intelligence between your critical systems and criminals. Without any changes in infrastructure, in a matter of minutes, network and security engineers will have up-and-running active DDoS protection.

      FlowMon Monitoring Center

      Flowmon monitoring center (FMC) is a professional tool for effective NetFlow statistics analysis. It is optimized for storing and processing high amounts of statistical data.

      FlowMon Network Solution

      A fast, reliable and well secured network is of crucial importance to any organization. Flowmon is the answer to this challenge using leading edge IP flow monitoring technology (NetFlow, IPFIX) to give you the best solution for network visibility.

      FlowMon Probe

      FlowMon Probe provides a statistical data needed for monitoring and network security, troubleshooting, IP-Billing and accounting, capacity planning, users and application control e.t.c.

      FlowMon Traffic Recorder

      FlowMon Traffic Recorder extends the functionality provided by the probe in the data stream recording area including a data content.

  • ForeScout
    • ForeScout Technologies, Inc. is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of January 2016, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

      ForeScout CounterACT

      ForeScout CounterACT allows IT organizations to readily understand and control how all users, systems and devices, including mobile devices and VMs, access network resources and applications.

  • LogPoint
    • LogPoint is a European SIEM pioneer, having introduced our SIEM Europe are experiencing the LogPoint difference. LogPoint is the most flexible platform available for collecting, analyzing, and monitoring all data – whether they are generated by applications, databases, or infrastructure, or involve sensitive assets, manufacturing systems, or security systems. The scale-as-you-grow principle allows for quick and easy visualization with only a few resources – no matter how vast the IT landscape, no matter how dense the data. With headquarters in Copenhagen, Logpoint sales and support offices are located throughout Europe and their partnerships reach across the globe.product to the market in 2008. Today, over 300 clients throughout.

      LogPoint SIEM

      The LogPoint SIEM solution extracts events and incidents from the billions of logs existing in any IT infrastructure of any size

  • Mojo Networks
    • The Mojo cloud managed platform enables a complete workflow for wireless access, security and engagement that leverages a purpose-built cloud architecture to produce enterprise-grade wireless networks for every application required, and ensures high reliability through an approach that is automated, scalable, secure and cost effective.

      Built with the latest cloud technology and innovations that overcome the limitations of older cloud, controller-less and controller-based solutions, the Mojo Cloud delivers simplicity, reliability, security, scalability and extensibility without compromising on the advanced features expected of an enterprise-grade WiFi solution. And if that wasn't enough, it enables the industry's first cognitive WiFi solution and freedom from high-margin hardware.

      The only vendor offering fully integrated futures in a single platform.

      Access Control

      With a suite of features to identify users, devices and applications and to control the access and privileges they get on your network, Mojo provides a comprehensive solution to enforce context-based policies and protect your network from abuse in today’s world of BYOD and IoT.

      Cognition Plane

      Mojo Aware™ is the dawn of a new era of Cognitive WiFi that uniquely harnesses the power of cloud, big data analytics, machine learning, software-defined networking, and cognitive computing to deliver the best experience possible to WiFi users, to give network IT staff their life back and to reduce network operational costs by at least half.

      Guest Access

      Mojo Networks provides a complete guest WiFi solution with reliable WiFi access, a menu of options to onboard guest WiFi users—including integration with social networks and other third-party systems; in-built templates to simply design stunningly beautiful splash pages and other content without any Web development; firewall to segregate guest traffic and prevent access to the corporate or internal networks; enforcement of guest WiFi security policies using role based control and industry’s best WIPS; SSID scheduling and traffic shaping to limit guest access; and guest WiFi analytics.

      Mojo Cloud Integration Point

      Mojo’s Cloud Integration Point (CIP) securely connects on-premise services such as Wireless LAN Controllers (WLC), Syslog, and ArcSight with Mojo Cloud to exchange information.

      Mojo Cloud: the unified platform for your wireless infrastructure

      A centralized management plane remarkably simplifies how you manage WiFi networks. A flexible data plane gives you the choice of how your WiFi networks should switch data and let’s you take advantage of the cloud regardless of how your network is designed. A distributed control plane enables enterprise WiFi features without the scalability issues of older architectures. And an innovative cognition plane automates WiFi network monitoring and troubleshooting to optimize the WiFi user experience and minimize the mean time to resolution (MTTR) for network access and performance issues.

      Multi-function 3rd Radio

      A dedicated dual-band 2x2 third radio provides granular RF visibility, 24/7 wireless security and advanced client emulation, spectrum analysis and troubleshooting capabilities, not possible with background scanning, while allowing the access radios to deliver premium performance for real-time applications in high-density environments. The multi-function third radio also significantly reduces the deployment cost by avoiding the need for overlay dedicated sensors and the additional cabling that comes with them.

      Software Disaggregation

      Mojo Networks is driving open networking innovation in the WiFi industry to liberate enterprise networks from vendor lock-in, proprietary hardware and high margins. Software disaggregation—breaking dependency between software and hardware—is the first necessary step towards realizing this vision. Mojo customers and partners are already benefitting from Mojo’s software disaggregation in the form of significant cost savings.

      Visual Packet Trace Analysis

      The intelligent cognition plane of the Mojo Cloud architecture largely automates WiFi network monitoring and troubleshooting. In the rare occasion where a packet capture is necessary for a deeper analysis, Mojo Packets, the cloud-based visual WiFi packet analyzer, simplifies packet trace analysis via progressive visualization of Wi-Fi connections and visual coding of Wi-Fi frames, providing insights otherwise not readily available when sifting through thousands of packets in Wireshark or similar tools.

      WiFi Analytics

      WiFi analytics based on presence and behavior of WiFi devices can provide significant business intelligence, and can help multiple functions, e.g., marketing (A/B testing of storefront displays, measure ROI of marketing campaigns, context-based guest engagement), operations (staff planning, optimize facility utilization), and IT (network planning and design based on user density). The Mojo Cloud delivers anonymous analytics based on WiFi device MAC addresses collected from probe requests, content analytics and application visibility based on WiFi connections, and engagement analytics based on WiFi users who opt in and choose to share their personal information.

      Wireless Intrusion Prevention

      Mojo AirTight, the industry-leading wireless intrusion prevention system (WIPS) provides the most comprehensive protection from wireless vulnerabilities and threats. Based on patented behavioral techniques, Mojo AirTight uniquely automates wireless threat detection while minimizing false alarms and enables surgical wireless threat prevention both over the air and on the wire. It comes built-in with the Mojo WiFi access solution or can be deployed as an overlay on top of any WiFi network. Trusted by federal agencies, top companies, education institutes and carriers worldwide, Mojo AirTight is the only WIPS:

      • Ranked at the top by Gartner in all its six MarketScope reports on WIPS
      • NIAP EAL2+ certified for Common Criteria
      • FIPS 140-2 certified
      • First to be listed on the DISA UC APL


  • Proofpoint
    • Proofpoint is a pioneering security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information.

      Proofpoint Enterprise Archive

      Proofpoint Enterprise Archive is an on-demand archiving solution that addresses three key challenges – legal discovery, regulatory compliance, and email storage management—without the headaches of managing archiving in-house.

      Proofpoint Enterprise Governance

      Proofpoint Enterprise Governance Suite is an information governance solution that provides organizations the ability to monitor and apply policy to unstructured information—wherever it exists across the enterprise. By proactively governing unstructured information “in-place,” organizations can effectively protect brand and manage regulatory compliance, security, and confi dentiality.

      Proofpoint Enterprise Privacy

      The Proofpoint Enterprise Privacy suite provides a full lifecycle approach to protecting information of all types.

      Proofpoint Enterprise Protection

      Proofpoint Enterprise Protection delivers everything needed to keep an organization safe from email threats bytaking a full lifecycle approach to securing email.

      Proofpoint Targeted Attack Protection

      Proofpoint Targeted Attack Protection provides the tools to keep an organization safe from the malicious nature of targeted spear-phishing attacks and is a natural complement to any existing email security gateway.

  • Protected-networks
    • provides Access Governance. The company sees its strengths in the development of a homogenous and integrated solution, which combines several functionalities and changes the way in which Active Directory and file server access rights management is traditionally approached. New ways of presenting information, enabling documentation and allowing administration of access rights differentiate the solution from its competitors.


      8MAN is a fully integrated software solution for the management of Active Directory, file server and SharePoint access rights. Limit access rights to a “need to know” basis thereby significantly reducing data security risks. Ensure accountability and compliance with internal policies by knowing who touched which files.

  • Veriato
    • Veriato (formerly known as SpectorSoft) is the recognized leader and pioneer in the computer, mobile device and Internet monitoring and analysis software market. More than 500,000 consumers and 50,000 businesses, government organizations, schools and law enforcement agencies have purchased Veriato products to help keep children and employees safe online, and to prevent Internet abuse, data loss and compliance violations in the workplace.

      Veriato 360

      Veriato 360 is comprehensive user-based Activity Monitoring software that allows IT professionals, Human Resources, Legal Counsel, and General Managers to monitor, replay, and analyze all user, department, and division electronic activity.

      Veriato INVESTIGATOR

      Veriato INVESTIGATOR automatically records emails, chats, instant messages, web sites visited, and more on Windows-based servers, PCs, and laptops.

      Veriato Recon

      Veriato Recon is User Behavior Analysis Software that provides early warning of suspicious behavior by passively monitoring user behavior and alerting when actions contradict policies or vary from well-defined patterns.

  • WorksPad
    • WorksPad is a brand-name, denoting the company MobilityLab LLC and the unique product, providing all-in-one mobile workplace for enterprises. MobilityLab LLC is in technology partnership with the leading global enterprise mobility ecosystem providers: Citrix, MobileIron, VMWare AirWatch, Samsung. MobilityLab LLC is listed as one of “20 Most Promising BYOD Solution Providers 2016” by «CIO Review» magazine. WorksPad is included in “50 Most Valuable Brands 2017” by The Silicon Review.


      WorksPad is the  integrated enterprise mobile workplace with a unique to mobile world all-in-one approach. It provides an access to corporate file and document resources, file sync & share with editing capabilities, corporate email, contacts and corporate address book, calendars, intranet and internet browsing - all in one application on iOS or Android mobile devices, with enterprise-grade security. With WorksPad by MobilityLab LLC you can perform the same daily office tasks but wherever you like or need in highly productive and secure way.


      WorksPad for MobileIron provides mobile workers on iOS and Android devices with an integrated enterprise-grade workplace, which incorporates in one mobile application an access to corporate file and document resources, file sync & share with editing capabilities, corporate email, corporate address book, calendars, intranet and internet browsing and utilize he full power of AppConnect technology by MobileIron for ultimate manageability and security for enterprises.

Go to regional site
OK (Redirect in 3 sec)

headtechnology UA

Levanevskogo Str., 6, office 79

03058 Kiev, Ukraine

tel.: +38 044 353 30 20

fax: +38 044 457 85 41


  • All

  • Hard

  • SaaS

  • Soft

  • Virtual