Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1735 results found

1735 results found in Lot 2: Cloud software in the category Security risk management

  • Microsoft Entra ID

    NAK Consulting Services Ltd

    A Microsoft Entra ID Premium (P) Licence

  • Induction Zesty Patient Engagement Portal

    Zesty Ltd

    Zesty is a patient engagement platform that transforms interactions between patients and care teams. Through integration with most leading PAS/EPR/Diagnostic systems it provides smart appointment management, paperless letters, targeted questionnaires, timely patient information, and integrated video consultations leading to clinical workflow efficiencies and enhanced patient engagement along entire care pathways.

  • Tenable PCI-ASV

    INTEGRITY360 LIMITED

    Tenable PCI ASV allows unlimited scans of your networks to identify and address vulnerabilities and ensure your organization complies with PCI-DSS. Tenable ensures vulnerabilities don't exist for more than 90days on any networks involving payment-card transactions.

  • Arctic Wolf Managed Security Operations

    CYBER SECURITY DEFENCE CONSULTANTS LIMITED

    Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.

  • Netwrix Enterprise Auditor

    BYTES SOFTWARE SERVICES LIMITED

    Secure sensitive data and reduce the risk of a data breach. Minimize your attack surface by discovering sensitive information and keeping access to it at the least-privilege level. Pass compliance audits and enhance IT productivity. bssgc

  • Proofpoint Cloud Application Security Visibility and Control

    INTEGRITY360 LIMITED

    Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition.

  • Microsoft Windows 10/11 Enterprise E5 Suite

    BYTES SOFTWARE SERVICES LIMITED

    Windows operating system updated in the cloud with Windows Information Protection, Windows Hello for Business, Credential Guard, Device Guard, App Locker, plus Windows Defender Advanced Threat Protection. Can be used with either Windows 10 or Windows 11 bssgc

  • OnDMARC

    Red Sift Ltd

    Award-winning, cloud-based DMARC, DKIM, SPF, MTA-STS and BIMI configuration, automation and management tool. Protect against phishing and BEC attacks by stopping unauthorised use of email-sending domains.

  • Endpoint Security - EPDR (Endpoint Protection, Detection and Response)

    Redinet Ltd

    WatchGuard EPDR is a cybersecurity solution for computers and servers that combines a range of endpoint protection with EDR capabilities. It protects against advanced threats, zero-day malware, ransomware, phishing and malware-less attacks and URL & content filtering capabilities. EPDR automates the prevention, detection, containment, and response actions for ultimate security.

  • CDW Palo Alto Cortex Xpanse

    CDW LIMITED

    Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services. Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.

  • Cloud SASE Service

    Cisilion Limited

    Cisilion provide customers with a range of services including cloud consultancy, professional services and ongoing support or managed services for the deployment and support of SASE solution based on Cloud Security (Unbrella), Zero Trust Network Access (Duo), SD-WAN (Meraki) and Observability (Thousand Eyes)

  • Address Validation / Proof of Address

    Melissa Data Ltd

    Checks and verifies that a person is associated with a specific postal address. Performs data verification on input contact data. Verify an individual's: name, address, phone, email, date of birth, and national ID. Service helps with regulatory compliance, preventing fraud, KYC initiatives, and ensuring trust of the people accessing services.

  • Adversarial Artificial Intelligence Robustness Services For AI Benchmarking and Assurance

    ADVAI LTD

    A managed service to test and evaluate; cohering Advai's AI Robustness tools for adversarial stress testing, evaluation and red-teaming of neural-network-based AI. Critical in creating assured and robust AI that is resilient to real-world conditions, our platforms align with MLOps, and are suitable for both technical and non-technical users.

  • Lightspeed Filter - Web Filtering Solution

    GBM DIGITAL TECHNOLOGIES LIMITED

    Lightspeed Filter is a web filtering solution designed for schools and educational institutions. It offers comprehensive online safety, enabling administrators to block inappropriate content, monitor student activity, and ensure compliance with internet safety regulations. It provides customisable filtering policies and detailed reports to help maintain a secure digital learning environment.

  • boxxe Infoblox BloxOne Threat Defense

    BOXXE LIMITED

    "Infoblox BloxOne Threat Defense Advanced, a comprehensive DNS Detection and Response (DNSDR) solution, detects threat activity that other solutions miss and stops attacks before they occur with hunted, pre-campaign DNS threat intelligence to disrupt attacker supply chains. Intelligent ecosystem integrations and automation reduce manual effort,

  • Computacenter - ProofPoint Identity Threat Defense & Response (ITDR)

    Computacenter (UK) Ltd

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Flow - Leisure Management Software

    OpenPlay

    A complete technology ecosystem delivering an unrivalled customer-first experience across sport, health, and leisure to mobilise active populations and encourage healthy lifestyles. Flow streamlines multi-site operations through its modular software solution with flexibility to customise user journeys to promote self-service whilst providing data and insight to deliver optimal business value.

  • AvePoint Insights for Microsoft 365

    Avepoint UK Ltd

    Ensure compliance with aggregated sensitivity and activity data across your tenant so critical permissions surface at the top of the priority list. Implement corrective action on priorities, including permission removal, owner notification, or setting an expiration date - quickly securing collaboration in Teams, Groups, Sites, and OneDrive.

  • Security Operations Centre (SOCaaS)

    NETWORK INTEGRATION TECHNOLOGIES LTD

    ITogether's SOC-as-a-Service (SOCaaS) provides comprehensive 24/7 monitoring and management of your cybersecurity environment. Utilising advanced detection technologies and expert analysts, our service rapidly identifies and responds to threats, ensuring your data and systems are protected against cyber attacks while complying with industry standards.

  • Cyberbit Crisis Simulation 360

    CYBER SECURITY DEFENCE CONSULTANTS LIMITED

    Our cybercrisis exercise service provides leadership teams with the opportunity to hone response strategies in a hyper immersive, realistic setting

  • Comprehensive Defense Plan (Zone 1+2)

    QUADRIS LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • CDW Sophos Intercept X Advanced with XDR Server

    CDW LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Softcat Cloud Software Services

    SOFTCAT PLC

    Provides small, medium, large, enterprise software subscriptions solutions: -Accounting: FM Systems, Link Group IFRS 16 Lease Accounting -Education: Pluralsight -Analytics: Qliksense -RPA, AI -IT Service Management SysAid -GIS -CRM: Qualtrics -Security Solutions: Aikido, Egress Workspace Security, reduce Human Risk, Snyk Open Source, SAST, Code scanning -ERP:Dogma, Squiz -COTS: Eptura Engage

  • Sophos Central Intercept X for Mobile

    INTEGRITY360 LIMITED

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • AI Research & Testing Platform (Hybrid)

    CYBEXER TECHNOLOGIES

    AI Research & Testing Platform (Hybrid/ private cloud) is a specialized, managed cyber range tailored for AI-related research, development, and testing activities. This advanced platform provides researchers with stable and scalable environments optimized for the complexities of AI, ensuring safe, efficient, and compliant algorithm advancement.

  • Crowdstrike Falcon Cloud Security Licences

    MONDAS CONSULTING LTD

    Purchase Crowdstrike Falcon Cloud Security licences to utilise the power of the Crowdstrike Falcon Cloud Security tool for 24x7 MDR, threat hunting and Incident Response services for cloud. Crowdstrike Falcon Cloud Security is the most unified cloud- native application protection platform (CNAPP).

  • sa.global Managed Services

    SAGlobal (Europe) Ltd

    sa.global’s Managed Services plans are crafted to meet the needs of your business, depending on your stage of growth and scale of requirements. Our Managed Services includes system maintenance and regular updates which are charged based on size and complexity of the system and the level of support required.

  • Cyber Awareness Training and Simulated Phishing

    Hut Six

    Train, test and track your organisation's cyber security awareness with automatically customised training and phishing simulations in one platform. Hut Six specialises in high quality, interactive and engaging training. Create your own phishing attacks or leverage our pre-built templates in unlimited campaigns. Comprehensive, flexible reporting integrates training and phishing metrics.

  • Computacenter - Cisco Enterprise Agreement (CISCO EA)

    Computacenter (UK) Ltd

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Enterprise Agreement combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, CISCO EA combines supports legacy systems

  • UK Sovereign Symmetric Key Management - Arqit

    NINE23 LTD

    UK Sovereign Managed Cloud PaaS for Symmetric Key Management (Arqit - SKA(PaaS)™). Secure by design, it hardens cyber security across the network and data communications by generating symmetric encryption keys between end-points. Manage individual and group key sessions with policy enforcement. Supports existing encryption algorithms to layer into existing network.