Resources

0 FILES click to send request

Request Demo

  • Blue Coat
    • Blue Coat Systems is a leading provider of Web security and WAN optimization solutions. Blue Coat offers solutions that provide the visibility, acceleration and security required to optimize and secure the flow of information to any user, on any network, anywhere. Founded in 1996, Blue Coat provides products to more than 15,000 customers worldwide, including 88% of the Fortune Global 500.

      Blue Coat CacheFlow

      The Blue Coat CacheFlow appliance enables service providers to better manage excessive increases in network traffic and subscriber growth.

      Blue Coat Cloud Service

      Blue Coat Cloud Service delivers comprehensive web security as a service

      Blue Coat Data Loss Prevention

      Blue Coat Data Loss Prevention (DLP) enables you to detect and block potential data leaks quickly and accurately, all while achieving industry and regulatory compliance and risk mitigation objectives.

      Blue Coat MACH5

      Blue Coat MACH5 delivers the flexibility, power and speed you need for today’s business critical applications.

      Blue Coat PacketShaper

      Blue Coat PacketShaper delivers integrated visibility, control and compression capabilities in a single appliance.

      Blue Coat ProxyAV

      Blue Coat ProxyAV stops malware at the web gateway

      Blue Coat ProxyClient

      Blue Coat ProxyClient оptimizes application performance and security for remote workers. ProxyClient is a no-cost addition to your existing Blue Coat ProxySG infrastructure.

      Blue Coat ProxySG

      Blue Coat Full Proxy Edition of the ProxySG appliance family is part of Blue Coat’s Web security solutions that provides complete Web security and WAN Optimization. ProxySG delivers a scalable proxy platform architecture to secure Web communications and accelerate the delivery of business applications. ProxySG enables flexible, granular, policy controls over content, users, applications, web applications, and protocols.

      Blue Coat Reporter

      Blue Coat Reporter enables you to see all web-based user activities through dashboards and reports. Reporter supports up to 50 administrators, each with a custom dashboard. Reporter’s web API allows data, such as web usage patterns, bandwidth usage, application access summaries, blocked sites and more, to be exported into management consoles or reviewed by auditors using tools of their choice.

      Blue Coat WebFilter

      Blue Coat WebFilter Controls web access and stops the latest web threats in real time.

      Security Analytics Platform

      Security Analytics Platform from Blue Coat is easily deployed anywhere within your network—either as a pre-configured appliance, a virtual appliance, or software on your own hardware.

      THREATBLADES

      Integrating directly into the Security Analytics Platform, the Blue Coat ThreatBLADES use a cloud-based threat intelligence infrastructure powered by the Blue Coat WebPulse Collaborative Defense Cloud—leveraging the collaborative ‘network effect’ of more than 75 million users.

  • Catbird
    • Catbird® is a pioneer and leader in Software-Defined Segmentation and Security for the Hybrid IT Infrastructure. Catbird’s software suite of products was designed from the ground up to provide visibility into and protection of private clouds and virtual Data Centers, and is available for both VMware and OpenStack.

      CATBIRD INSIGHT

      Catbird Insight automatically and continuously discovers all assets in your virtual fabric, allows the grouping of these assets into logical Catbird TrustZones® and visualizes asset relationships and the east-west traffic flows between them for improved analytics.

      CATBIRD SECURE

      Catbird Secure enables automated enforcement of flexible security policies across Catbird TrustZones. The platform detects and alerts on potential security incidents, initiates corrective enforcement actions and provides instant compliance reporting for major standards and mandates.

  • Centrify
    • Centrify delivers integrated software and cloud-based solutions that centrally control, secure and audit access to cross-platform systems, mobile devices and applications by leveraging the infrastructure organizations already own - Microsoft Active Directory. From the data center and into the cloud, more than 4,000 organizations, including 40 percent of the Fortune 50 and more than 60 Federal agencies, rely on Centrify’s identity consolidation and privilege management solutions to reduce IT expenses, strengthen security and meet compliance requirements.

      Centrify Identity Service

      Integrated cloud app and mobile management. SSO for cloup apps and automated license management

      Centrify Identity Service, Mac Edition

      Active Directory-Based Security and Management for Mac and Mobile Devices

      Centrify Privilege Service

      Access and Password Management for the Modern Enterprise.

      Centrify Server Suite

      Unified identity management and audit across on-premises and cloud-based Windows, Linux, and UNIX Systems

  • FlowMon
    • Flowmon Networks empowers businesses to manage and secure their computer networks confidently. Through its high performance network monitoring technology and lean-forward behavior analytics, IT pros worldwide benefit from absolute network traffic visibility to enhance network & application performance and deal with modern cyber threats. FlowMon is leading the way of NetFlow/IPFIX network monitoring that is high performing, scalable and easy to use. With their solution recognized by Gartner, recommended by Cisco, Check Point and IBM, FlowMon is one of the fastest growing companies in the industry.

      FlowMon ADS

      Flowmon Anomaly Detection System is a modern detection system of the network attacks,anomalies, advanced persistent threats and undesirable behavior in the network.

      FlowMon APM

      FlowMon APM agent-less monitoring of all user transactions. Designed for web-based HTTP/HTTPS, MSSQL, Oracle applications.

      FlowMon Collector

      Flowmon Collector provides absolute control over the bandwidth utilization, optimization of network/application performance, quick troubleshooting and network protection against modern cyber threats.

      FlowMon DDoS Defender

      Due to their destructive nature and ability to affect networks with ease DDoS attacks have become especially worrisome to any business running web applications. Flowmon DDoS Defender puts advanced artificial intelligence between your critical systems and criminals. Without any changes in infrastructure, in a matter of minutes, network and security engineers will have up-and-running active DDoS protection.

      FlowMon Monitoring Center

      Flowmon monitoring center (FMC) is a professional tool for effective NetFlow statistics analysis. It is optimized for storing and processing high amounts of statistical data.

      FlowMon Network Solution

      A fast, reliable and well secured network is of crucial importance to any organization. Flowmon is the answer to this challenge using leading edge IP flow monitoring technology (NetFlow, IPFIX) to give you the best solution for network visibility.

      FlowMon Probe

      FlowMon Probe provides a statistical data needed for monitoring and network security, troubleshooting, IP-Billing and accounting, capacity planning, users and application control e.t.c.

      FlowMon Traffic Recorder

      FlowMon Traffic Recorder extends the functionality provided by the probe in the data stream recording area including a data content.

  • ForeScout
    • ForeScout Technologies, Inc. is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of January 2016, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

      ForeScout CounterACT

      ForeScout CounterACT allows IT organizations to readily understand and control how all users, systems and devices, including mobile devices and VMs, access network resources and applications.

  • HEAT Software
    • HEAT Software, Inc., a global leader in operational endpoint security, develops, integrates and markets security software solutions helping companies to protect their vital information and manage critical risk across network and endpoint assets. HEAT Software enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint- and Data Protection, Reporting and Compliance offerings.

      Lumension AntiVirus

      Lumension AntiVirus provides advanced protection via traditional signature-matching capabilities as well as innovative DNA Matching, SandBox and Exploit Detection technologies which provide proactive protection against zero-day threats.

      Lumension Application Control

      Lumension Application Control provides complete malware protection and increases IT and end-user productivity by preventing any unknown, un-trusted or malicious applications from executing.

      Lumension Device Control

      Lumension Device Control is an award-winning leader in preventing data loss / theft via removable devices / media. With Lumension Device Control, organizations can quickly identify all endpoint-connected devices in their environment and flexibly enforce a comprehensive security policy that prevents unauthorized use, limits malware intrusion, and forces encryption of sensitive data.

      Lumension Endpoint Management and Security Suite

      Lumension Endpoint Management and Security Suite unifies the functions of IT operations and security through a single console, server and agent architecture to seamlessly and more effectively address IT risk and systems management requirements across the enterprise. Lumension Endpoint Management and Security Suite delivers best-in-class, modularly licensed capabilities across patch management, anti-virus, configuration management, power management, application control, device control and asset management.

      Lumension Patch and Remediation

      Lumension Patch and Remediation streamlines and automates the patch management process in even the most complex, heterogeneous environments. Through proactive alerting on issues, you can address them immediately.

      Lumension Scan

      Lumension Scan, a component of Lumension Vulnerability Management, is a complete stand-alone, network-based scanning solution that performs a comprehensive external scan of all devices connected to your network, both managed and unmanaged.

  • LogPoint
    • LogPoint is a European SIEM pioneer, having introduced our SIEM Europe are experiencing the LogPoint difference. LogPoint is the most flexible platform available for collecting, analyzing, and monitoring all data – whether they are generated by applications, databases, or infrastructure, or involve sensitive assets, manufacturing systems, or security systems. The scale-as-you-grow principle allows for quick and easy visualization with only a few resources – no matter how vast the IT landscape, no matter how dense the data. With headquarters in Copenhagen, Logpoint sales and support offices are located throughout Europe and their partnerships reach across the globe.product to the market in 2008. Today, over 300 clients throughout

      LogPoint SIEM

      The LogPoint SIEM solution extracts events and incidents from the billions of logs existing in any IT infrastructure of any size

  • MobileIron
    • MobileIron was purpose-built to secure and manage mobile apps, data, and devices for global companies. MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy controls. Positioned in the Leaders Quadrant of Gartner, Inc.'s Magic Quadrant for Mobile Device Management Software 2011, MobileIron is solving the problems CIOs face as business data and applications move to smartphones and tablets. The MobileIron Virtual Smartphone Platform and the MobileIron Connected Cloud are the first solutions to give IT and users real-time intelligence and control over mobile content, activity, and apps in order to secure the enterprise, reduce wireless cost, and improve the mobile user experience.

      Advanced Mobile Device Management

      Advanced Mobile Device Management - solution for multi-OS mobile operations control.

      Mobile Activity Intelligence

      Mobile Activity Intelligence performs proactive cost control for mobile enterprises.

      MobileIron Apps@Work

      MobileIron Apps@Work provides an integrated solution to support native mobile apps securely on any mobile device.

      MobileIron Connected Cloud

      The MobileIron Connected Cloud is a mobile device management solution that can be fully integrated and operational in less than an hour. Once this step is done the IT can begin bringing mobile devices in management and distributing mobile apps using MobileIron’s Enterprise App Storefront, without losing enterprise-grade security. The MobileIron Connected Cloud gives companies around the world a highly scalable infrastructure enabling the IT to support everything from initial pilots to tens of thousands of devices.

      MobileIron Docs@Work

      The challenge for the Mobile IT team is to provide a great user experience when accessing enterprise content on their mobile device without sacrificing document security.

      MobileIron Virtual Smartphone Platform

      The MobileIron Virtual Smartphone Platform is the first solution to combine data- driven smartphone and tablet management with real-time wireless cost control.

      MobileIron Web@Work

      The Web@Work Enterprise Mobile Browser enables immediate, secure access to internal websites and web applications, while preserving a native and high-fidelity web browsing experience.

  • Mojo Networks
    • The Mojo cloud managed platform enables a complete workflow for wireless access, security and engagement that leverages a purpose-built cloud architecture to produce enterprise-grade wireless networks for every application required, and ensures high reliability through an approach that is automated, scalable, secure and cost effective.

      Built with the latest cloud technology and innovations that overcome the limitations of older cloud, controller-less and controller-based solutions, the Mojo Cloud delivers simplicity, reliability, security, scalability and extensibility without compromising on the advanced features expected of an enterprise-grade WiFi solution. And if that wasn't enough, it enables the industry's first cognitive WiFi solution and freedom from high-margin hardware.

      The only vendor offering fully integrated futures in a single platform.

      Access Control

      With a suite of features to identify users, devices and applications and to control the access and privileges they get on your network, Mojo provides a comprehensive solution to enforce context-based policies and protect your network from abuse in today’s world of BYOD and IoT.

      Cognition Plane

      Mojo Aware™ is the dawn of a new era of Cognitive WiFi that uniquely harnesses the power of cloud, big data analytics, machine learning, software-defined networking, and cognitive computing to deliver the best experience possible to WiFi users, to give network IT staff their life back and to reduce network operational costs by at least half.

      Guest Access

      Mojo Networks provides a complete guest WiFi solution with reliable WiFi access, a menu of options to onboard guest WiFi users—including integration with social networks and other third-party systems; in-built templates to simply design stunningly beautiful splash pages and other content without any Web development; firewall to segregate guest traffic and prevent access to the corporate or internal networks; enforcement of guest WiFi security policies using role based control and industry’s best WIPS; SSID scheduling and traffic shaping to limit guest access; and guest WiFi analytics.

      Mojo Cloud Integration Point

      Mojo’s Cloud Integration Point (CIP) securely connects on-premise services such as Wireless LAN Controllers (WLC), Syslog, and ArcSight with Mojo Cloud to exchange information.

      Mojo Cloud: the unified platform for your wireless infrastructure

      A centralized management plane remarkably simplifies how you manage WiFi networks. A flexible data plane gives you the choice of how your WiFi networks should switch data and let’s you take advantage of the cloud regardless of how your network is designed. A distributed control plane enables enterprise WiFi features without the scalability issues of older architectures. And an innovative cognition plane automates WiFi network monitoring and troubleshooting to optimize the WiFi user experience and minimize the mean time to resolution (MTTR) for network access and performance issues.

      Multi-function 3rd Radio

      A dedicated dual-band 2x2 third radio provides granular RF visibility, 24/7 wireless security and advanced client emulation, spectrum analysis and troubleshooting capabilities, not possible with background scanning, while allowing the access radios to deliver premium performance for real-time applications in high-density environments. The multi-function third radio also significantly reduces the deployment cost by avoiding the need for overlay dedicated sensors and the additional cabling that comes with them.

      Software Disaggregation

      Mojo Networks is driving open networking innovation in the WiFi industry to liberate enterprise networks from vendor lock-in, proprietary hardware and high margins. Software disaggregation—breaking dependency between software and hardware—is the first necessary step towards realizing this vision. Mojo customers and partners are already benefitting from Mojo’s software disaggregation in the form of significant cost savings.

      Visual Packet Trace Analysis

      The intelligent cognition plane of the Mojo Cloud architecture largely automates WiFi network monitoring and troubleshooting. In the rare occasion where a packet capture is necessary for a deeper analysis, Mojo Packets, the cloud-based visual WiFi packet analyzer, simplifies packet trace analysis via progressive visualization of Wi-Fi connections and visual coding of Wi-Fi frames, providing insights otherwise not readily available when sifting through thousands of packets in Wireshark or similar tools.

      WiFi Analytics

      WiFi analytics based on presence and behavior of WiFi devices can provide significant business intelligence, and can help multiple functions, e.g., marketing (A/B testing of storefront displays, measure ROI of marketing campaigns, context-based guest engagement), operations (staff planning, optimize facility utilization), and IT (network planning and design based on user density). The Mojo Cloud delivers anonymous analytics based on WiFi device MAC addresses collected from probe requests, content analytics and application visibility based on WiFi connections, and engagement analytics based on WiFi users who opt in and choose to share their personal information.

      Wireless Intrusion Prevention

      Mojo AirTight, the industry-leading wireless intrusion prevention system (WIPS) provides the most comprehensive protection from wireless vulnerabilities and threats. Based on patented behavioral techniques, Mojo AirTight uniquely automates wireless threat detection while minimizing false alarms and enables surgical wireless threat prevention both over the air and on the wire. It comes built-in with the Mojo WiFi access solution or can be deployed as an overlay on top of any WiFi network. Trusted by federal agencies, top companies, education institutes and carriers worldwide, Mojo AirTight is the only WIPS:

      • Ranked at the top by Gartner in all its six MarketScope reports on WIPS
      • NIAP EAL2+ certified for Common Criteria
      • FIPS 140-2 certified
      • First to be listed on the DISA UC APL

       

  • Proofpoint
    • Proofpoint is a pioneering security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance and secure communications. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information.

      Proofpoint Enterprise Archive

      Proofpoint Enterprise Archive is an on-demand archiving solution that addresses three key challenges – legal discovery, regulatory compliance, and email storage management—without the headaches of managing archiving in-house.

      Proofpoint Enterprise Governance

      Proofpoint Enterprise Governance Suite is an information governance solution that provides organizations the ability to monitor and apply policy to unstructured information—wherever it exists across the enterprise. By proactively governing unstructured information “in-place,” organizations can effectively protect brand and manage regulatory compliance, security, and confi dentiality.

      Proofpoint Enterprise Privacy

      The Proofpoint Enterprise Privacy suite provides a full lifecycle approach to protecting information of all types.

      Proofpoint Enterprise Protection

      Proofpoint Enterprise Protection delivers everything needed to keep an organization safe from email threats bytaking a full lifecycle approach to securing email.

      Proofpoint Targeted Attack Protection

      Proofpoint Targeted Attack Protection provides the tools to keep an organization safe from the malicious nature of targeted spear-phishing attacks and is a natural complement to any existing email security gateway.

  • protected-networks.com
    • protected-networks.com provides Access Governance. The company sees its strengths in the development of a homogenous and integrated solution, which combines several functionalities and changes the way in which Active Directory and file server access rights management is traditionally approached. New ways of presenting information, enabling documentation and allowing administration of access rights differentiate the solution from its competitors.

      8MAN

      8MAN is a fully integrated software solution for the management of Active Directory, file server and SharePoint access rights. Limit access rights to a “need to know” basis thereby significantly reducing data security risks. Ensure accountability and compliance with internal policies by knowing who touched which files.

  • VASCO
    • VASCO Data Security International Inc. is a world leader in Strong Authentication and e-Signature solutions, specializing in online accounts, identities, and transactions. As global software company, VASCO serves a customer base of approximately 9,000 companies in over 100 countries, including more than 1,300 international financial institutions. In addition to the financial sector, VASCO technologies secure sensitive information and transactions for the enterprise security, e-commerce, and e-government industries.

      aXsGUARD GATEKEEPER

      aXsGUARD GATEKEEPER offers a firewall, intrusion prevention system, anti-virus and web content filtering, but it incorporates VASCO two-factor authentication as well.

      DIGIPASS

      VASCO DIGIPASS provides strong user authentication and e-Signatures and is compatible with more than 50 international vendors for e-commerce, e-banking, e-networking and e-government applications.

      VASCO IDENTIKEY Server

      IDENTIKEY Server is an authentication software suite for organizations of all sizes that want to address their concerns about secure access with a state-of-the-art solution.

  • Veriato
    • Veriato (formerly known as SpectorSoft) is the recognized leader and pioneer in the computer, mobile device and Internet monitoring and analysis software market. More than 500,000 consumers and 50,000 businesses, government organizations, schools and law enforcement agencies have purchased Veriato products to help keep children and employees safe online, and to prevent Internet abuse, data loss and compliance violations in the workplace.

      Veriato 360

      Veriato 360 is comprehensive user-based Activity Monitoring software that allows IT professionals, Human Resources, Legal Counsel, and General Managers to monitor, replay, and analyze all user, department, and division electronic activity.

      Veriato INVESTIGATOR

      Veriato INVESTIGATOR automatically records emails, chats, instant messages, web sites visited, and more on Windows-based servers, PCs, and laptops.

      Veriato Recon

      Veriato Recon is User Behavior Analysis Software that provides early warning of suspicious behavior by passively monitoring user behavior and alerting when actions contradict policies or vary from well-defined patterns.

  • WorksPad
    • WorksPad is a brand-name, denoting the company MobilityLab LLC and the unique product, providing true-productive all-in-one mobile workplace for enterprises. The company’s mission is to deliver the product, converting tablets and smartphones into the full analogue of PC with the one more degree of freedom – mobility. With WorksPad by MobilityLab LLC you can perform the same daily office tasks as emailing, file managing, document editing, but wherever you like or need in highly productive and secure way.

      WORKSPAD

      WorksPad provides mobile workers with an integrated enterprise-grade workplace, including corporate file sync and share, enhanced e-mail client, built-in office tools, corporate address book and calendar, and screen share service. All-in-one paradigm reinforces Data Loss Prevention (DLP) policy and increases productivity by PC-like user experience (UX).

      WORKSPAD FOR MOBILEIRON

      WorksPad for MobileIron provides mobile workers with an integrated enterprise-grade workplace, including corporate file sync and share, enhanced e-mail client, built-in office tools, corporate address book and calendar, and screen share service. All-in-one paradigm reinforces Data Loss Prevention (DLP) policy and increases productivity by PC-like user experience (UX). WorksPad for MobileIron uses the full power of AppConnect technology by MobileIron for ultimate manageability and security for enterprises.

Go to regional site
OK (Redirect in 3 sec)
Cancel

headtechnology UA

Levanevskogo Str., 6, office 79

03058 Kiev, Ukraine

tel.: +38 044 353 30 20

fax: +38 044 457 85 41

mail: info@headtechnology.com.ua

  • All

  • Hard

  • SaaS

  • Soft

  • Virtual