Resources

Brochures

  • Centrify
    • Centrify delivers Zero Trust Security through the power of Next-Gen Access. The Centrify Zero Trust Security model assumes that users inside a network are no more trustworthy than those outside the network. Centrify verifies every user, validates their devices, and limits access and privilege. Centrify also utilizes machine learning to discover risky user behavior and apply conditional access — without impacting user experience. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a-Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). Over 5,000 worldwide organizations, including over half the Fortune 100, trust Centrify to proactively secure their businesses.

      Centrify DirectAudit

      Centrify DirectAudit enables detailed, real-time auditing of privileged user sessions on Windows, UNIX and Linux systems providing a full accounting of user activity and system access. DirectAudit’s detailed capture of historical user activity establishes accountability and strengthens compliance reporting by recording user access to systems, specific commands and privileges used and the exact modifications to key files and configurations that were made. With DirectAudit enterprises can closely monitor IT contractors and offshore workers, pinpoint suspicious activity through real-time monitoring and troubleshoot system failures by replaying actions for root-cause analysis.

      Centrify DirectAuthorize

      Centrify DirectAuthorize centrally manages and enforces role-based entitlements for fine-grained control of user access and privileges on UNIX and Linux systems.

      Centrify DirectControl

      Centrify DirectControl centrally secures privileged user access to cross-platform systems and applications by leveraging Active Directory.

      Centrify DirectSecure

      Secures sensitive information by dynamically isolating cross-platform systems and encrypting data in motion

      Centrify Suite

      Centrally control, secure and audit access to cross-platform systems, mobile devices and applications.

  • ForeScout
    • ForeScout Technologies, Inc. is transforming security through visibility. ForeScout offers Global 2000 enterprises and government organizations the unique ability to see devices, including non-traditional devices, the instant they connect to the network. Equally important, ForeScout lets you control these devices and orchestrate information sharing and operation among disparate security tools to accelerate incident response. Unlike traditional security alternatives, ForeScout achieves this without requiring software agents or previous device knowledge. The company’s solutions integrate with leading network, security, mobility and IT management products to overcome security silos, automate workflows and enable significant cost savings. As of January 2016, more than 2,000 customers in over 60 countries improve their network security and compliance posture with ForeScout solutions.

      ForeScout CounterACT

      ForeScout CounterACT allows IT organizations to readily understand and control how all users, systems and devices, including mobile devices and VMs, access network resources and applications.

      ForeScout MDM

      ForeScout MDM helps IT administrators streamline the process to provision, manage and secure today’s expanding suite of smartphones and tablets, all from a single portal. ForeScout MDM for mobile devices is an easy to use platform that includes all of the essential functionality for end-toend management of iOS, Android, BlackBerry, and Windows Phone devices.

      ForeScout Mobile

      ForeScout Mobile is the easiest, most #exible way for IT security managers to say “yes” to personal mobile devices on the enterprise network without compromising security. ForeScout Mobile works with ForeScout’s leading network access control (NAC) platform, ForeScout CounterACT, to provide real-time visibility and control of everything on the network— wired and wireless, managed and unmanaged, PCs and handheld devices.

      ForeScout NAC

      Continuous Monitoring and Remediation capabilities extend the power of CounterACT as an automated security control platform for greater IT responsiveness and compliance assurance.

  • LogPoint
    • LogPoint is a European SIEM pioneer, having introduced our SIEM Europe are experiencing the LogPoint difference. LogPoint is the most flexible platform available for collecting, analyzing, and monitoring all data – whether they are generated by applications, databases, or infrastructure, or involve sensitive assets, manufacturing systems, or security systems. The scale-as-you-grow principle allows for quick and easy visualization with only a few resources – no matter how vast the IT landscape, no matter how dense the data. With headquarters in Copenhagen, Logpoint sales and support offices are located throughout Europe and their partnerships reach across the globe.product to the market in 2008. Today, over 300 clients throughout.

      LogPoint 5 Product Features

      Robust. Dynamic. Unparalleled.

  • MobileIron
    • Mobile technology is driving a massive shift in the ability of IT to support the way people want to work and collaborate. In this era of enterprise mobility management (EMM), modern enterprises must deliver native mobile experiences that are available to users anywhere, anytime while ensuring that IT can secure corporate information everywhere.

      MobileIron stands out from other MDM vendors by providing expanded EMM capabilities to IT organizations that need to secure mobile devices, applications and content. The MobileIron Enterprise Mobility Management (EMM) solution is a mobile security platform that secures data-at-rest on mobile devices, in applications, and in cloud storage, as well as data-in-motion as it moves between corporate networks, devices, and storage repositories.

      MobileIron's mission is to enable modern enterprises to secure and manage information as it moves to mobile and to the cloud, while preserving end-user privacy and trust. With MobileIron, IT teams can achieve more than just its mobile device management objectives – they can secure corporate information wherever it lives while preserving the sanctity of employee privacy. MobileIron achievements include:

      MobileIron achievements include:

      • Leader in the Gartner 2017 Report: Magic Quadrant for Enterprise Mobility Management Suites report for 7 years in a row.
      • Surpassed 10 million cumulative seats and 15,000 cumulative customers who have purchased our platform since 2009.
      • Selected by the global companies in the most highly regulated and security conscious industries, including financial services, healthcare, pharmaceuticals, and federal government agencies
      • A layered security model that supports integrated Mobile Device Management (MDM), Mobile Application Management (MAM), and Mobile Content Management (MCM).

      MobileIron Connected Cloud

      The MobileIron Connected Cloud is a mobile device management solution that can be fully integrated and operational in less than an hour. Once this step is done the IT can begin bringing mobile devices in management and distributing mobile apps using MobileIron’s Enterprise App Storefront, without losing enterprise-grade security. The MobileIron Connected Cloud gives companies around the world a highly scalable infrastructure enabling the IT to support everything from initial pilots to tens of thousands of devices.

      MobileIron Docs@Work

      The challenge for the Mobile IT team is to provide a great user experience when accessing enterprise content on their mobile device without sacrificing document security.

      MobileIron Virtual Smartphone Platform

      The MobileIron Virtual Smartphone Platform is the first solution to combine data- driven smartphone and tablet management with real-time wireless cost control.

      MobileIron Web@Work

      The Web@Work Enterprise Mobile Browser enables immediate, secure access to internal websites and web applications, while preserving a native and high-fidelity web browsing experience.

  • Solarwinds
    • SolarWinds is the worldwide leader in network management software, providing powerful and affordable IT management software to customers worldwide, from Fortune 500® enterprises to small businesses, MSPs, government agencies, and educational institutions.

      SolarWinds offer value-driven products and tools that solve a broad range of IT management challenges – whether those challenges are related to networks, servers, applications, storage or virtualisation. With such a great solution range, it makes putting packages together for your customers easy, keeping them happy and a great margin for you.

      SolarWinds is a leading provider of powerful and affordable IT infrastructure management software. Our products give organizations worldwide, regardless of type, size, or IT infrastructure complexity, the power to monitor and manage the performance of their IT environments, whether on-premise, in the cloud, or in hybrid models.

      Learn more today at www.solarwinds.com.

      The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks of) their respective companies.

      © 2019 SolarWinds Worldwide, LLC. All rights reserved.

      8MAN

      Since access rights are as complex as the companies they represent, we decided to put our focus on the visualisation of access rights so that each company can get an understanding of its internal structure and complexity. This visualisation makes it easy for clients to understand the individual challenges and unique risk factors affecting their data security. The specially developed 8MAN graphical interface, ensures that permissions across all resources (Active Directory, File Server and SharePoint) are presented quickly and are clearly understandable.

  • Veriato
    • Veriato (formerly known as SpectorSoft) is the recognized leader and pioneer in the computer, mobile device and Internet monitoring and analysis software market. More than 500,000 consumers and 50,000 businesses, government organizations, schools and law enforcement agencies have purchased Veriato products to help keep children and employees safe online, and to prevent Internet abuse, data loss and compliance violations in the workplace.

      SPECTOR 360

      SPECTOR 360 is comprehensive user-based Activity Monitoring software that allows IT professionals, Human Resources, Legal Counsel, and General Managers to monitor, replay, and analyze all user, department, and division electronic activ-ity.

      Spector CNE Investigator

      Spector CNE automatically records emails, chats, instant messages, web sites visited, and more on Windows-based servers, PCs, and laptops.

Go to regional site
OK (Redirect in 3 sec)
Cancel

headtechnology UA

Levanevskogo Str., 6, office 79

03058 Kiev, Ukraine

tel.: +38 044 353 30 20

fax: +38 044 457 85 41

mail: info@headtechnology.com.ua

  • All

  • Hard

  • SaaS

  • Soft

  • Virtual