Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3835 results found

3835 results found in Lot 2: Cloud software in the category Application security

  • Umbraco Heartcore website build

    TRUE DIGITAL LIMITED

    Building world class websites using Umbraco Heartcore, and creating headless composable digital experience platforms to answer our clients bespoke requirements.

  • Dynamics 365 for Field Service

    TELEFÓNICA TECH UK BUSINESS APPLICATIONS LIMITED

    Microsoft Dynamics 365 for Field Service integrates case management with work orders, offering top-notch field-service management. It includes work order, schedule, dispatch, routing, repairs, returns, and inventory management. Tailored for field-based teams, it optimises business processes, delivering excellence in field service.

  • Fully Provisioned TAK Server Ecosystem

    ROWDEN TECHNOLOGIES LTD.

    Rowden's Fully Provisioned TAK Server Ecosystem delivers top-tier performance across cloud platforms, with Kubernetes-driven scaling and failover, comprehensive support, and extensive add-ons like VoIP and video re-streaming. Designed for complex missions with multiple user demands, it ensures uninterrupted operations with full data security and support. Accredited to OFFICIAL-SENSITIVE.

  • Broadcast SMS

    BOOMERANG I-COMMS LTD

    Boomcast delivers Broadcast conversational messaging, 2-way SMS, voice, and email bulk communications. Our multi-channel messaging can automatically match responses and deliver them to your email. Schedule automated messaging campaigns across individuals or dynamic groups and create inbound SMS, email, and voice campaigns. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited

  • Exabeam SaaS (SIEM)

    CYBANETIX LIMITED

    Exabeam SaaS Cloud keeps security management in the cloud, providing the full breadth of Exabeam’s SIEM collection, detection, investigation and response capabilities as a cloud-based service. Exabeam SaaS includes the following product offerings: Fusion Core, Fusion XDR, Fusion SIEM, Fusion Enterprise.

  • Managed Detection and Response Service

    TMC3 LIMITED

    tmc3's Managed Detection and Response (MDR) Service provides a fully outsourced 24/7x365 Managed Detection and Response SOC capability. We utilise technology platforms and experienced security analysts to provide a full MDR capability. Including SIEM, Threat Intelligence, Automation, Incident Management and Vulnerability Management. Monitoring and detection as a fully managed Service.

  • Proofpoint Core - P0 Bundle

    INTEGRITY360 LIMITED

    Resolve your email threats across attack chains, from detection to response. Automate abuse mailbox management by removing malicious user-reported phishing-emails. Address threats lik phishing, business email compromise (BEC), supplier fraud, ransomware/malware. Gain visibility into who's being attacked, how they're being attacked, whether they click on/report phishing and whether they're compromised

  • Employment Screening Services & DBS Specialists

    COMPLETE BACKGROUND SCREENING LTD

    An award winning DBS Specialist & Background Screening provider, serving large national & multinational organisations across the UK and Overseas. Offering unrivalled software platforms for eBulk, eBroker, and eScreening approved by the DBS, Disclosure Scotland, Access NI, and the UK Home Office.

  • Echo Incident - incident management

    BIT ZESTY LIMITED

    EchoIncident is an incident management platform that helps tech-driven businesses manage incidents from the initial alert to post-mortem analysis and beyond, ensuring smooth operational continuity

  • Censornet Email Security (SEG)

    CM Security Ltd

    Censornet Secure Email Gateway is an email security solution designed to protect organisations from various email-borne threats such as spam, phishing attacks, malware, and data leaks. It acts as a gatekeeper for incoming and outgoing emails, ensuring that only legitimate and safe emails reach their intended recipients.

  • Fortinet Fortiweb WAF as a Service

    QUADRIS LIMITED

    FortiWeb WAFs provide advanced features that defend your web-applications and APIs from known and zero-day threats. Using an advanced multi-layered approach, FortiWeb protects against the OWASP Top 10 and more. FortiWeb customises the protection of each application, providing robust protection without requiring the time-consuming manual tuning required by other solutions.

  • Sophos Zero Trust Network Access (ZTNA)

    Cyberlab

    Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users.

  • boxxe BitDefender GravityZone Business Security

    BOXXE LIMITED

    Bitdefender GravityZone is an easy-to-use, single security platform to address all security threats. It protects against prevalent threats (ransomware, phishing attacks, fileless attacks etc) with prevention, detection and response capabilities. Proactively highlighting risk regarding endpoint configurations, policies and CVE's throughout the asset lifecycle.

  • CDW NetApp Cloud Sync

    CDW LIMITED

    An easy to use cloud replication and synchronization service for transferring NAS and Object data between on-premises and cloud object stores

  • CyberArk Endpoint Privilege Manager (EPM) SaaS

    SOFTCAT PLC

    CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.

  • Email Security - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Email Security – resolve attacks across entire attack chain, detection to response. Automate abuse mailbox management by removing user-reported phishing emails. Address threats – phishing, business-email-compromise, supplier fraud, ransomware and malware. Gain visibility of who’s being attacked, how they are, whether they click on or report phishing and if compromised.

  • Multi-Cloud Docker Deployments

    LEFKE IT LIMITED

    At LefkeIT, our Multi-Cloud Docker Deployments service is designed for Government Departments, ensuring flexibility and redundancy in containerized application deployment. We specialize in deploying Docker containers across multiple cloud providers, enabling seamless migration and optimal resource utilization. Trust us to maximize your infrastructure's resilience and scalability with multi-cloud Docker deployments.

  • Claroty xDome OT/IT Security

    Barrier Networks

    Claroty xDome spans the entire cybersecurity journey, from empowering organisations with comprehensive OT (operational techncology) / ICS (Industrial Control Systems) asset visibility, identifying, measuring, and prioritising risk, to deploying Zero Trust-based protective controls, to optimising threat detection through a vast network of integrations. xDome is a modular SaaS platform.

  • Barracuda Email Protection Premium Plus

    PRIMESYS LTD

    Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks while also protecting data from accidental deletion and compliance via email archiving

  • Mobile Call Recording & SMS Recording

    Business Systems (UK) Ltd

    Mobile call recording and SMS recording enables your organisation to record inbound and outbound calls, together with SMS communications. Providing your mobile workforces with all the benefits of office based communications. Capture every detail with Mobile Voice and SMS Recording with Business Systems Mobile Voice recording solutions.

  • Sophos Network Detection and Response

    CHESS ICT LIMITED

    Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • Microsoft Defender EDR Licences

    MONDAS CONSULTING LTD

    Purchase Microsoft Defender EDR licences to utilise the power of the Microsoft Defender Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Microsoft Defender EDR for signs of malicious activity on your network.

  • Local Government Digital Platform

    S8080 LIMITED

    ISO27001 open-source CMS digital platform for Local Government / Local Authorities. S8080's icon-driven Local Government self-service digital platforms securely handle multilingualism, forms, CRM/case management integrations with single sign-on, transactions and devolved publishing. Choice of easy-to-use, powerful content management systems. Mobile and accessible, designed around Local Government / Council user's needs.

  • Zivver - Secure Email Platform

    ZIVVER

    Zivver automates email security, allowing organisations to avoid data leaks and ensure compliant communications. Providing thousands of organisations worldwide with a native email security tool that combines; contextual AI-powered human error prevention, best-in-class AES 256-bit email encryption, recipient verification, email revocation, verified proof of delivery, 5TB file exchange and eSignatures.

  • UCD Strategy

    COGWORX LIMITED

    Understanding the drivers, emotions and challenges of your audience through to the practicalities of bringing a product or service to market.

  • Sophos Cloud Optix

    PHOENIX SOFTWARE LIMITED

    Sophos Cloud Optix, the Sophos Cloud Security Posture Management solution, proactively reduces business risk from unsanctioned activity, vulnerabilities, and misconfigurations across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform public cloud environments.

  • Armis Centrix

    SOFTCAT PLC

    Cybersecurity solution that provides organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security posture of devices connected to a network, ensuring a strengthened defense against cyber threats.

  • Book a Desk Space Microsoft Power App

    CEOX SERVICES LTD

    Ceox’s Book a Desk Space App on Microsoft’s Power Platform enables individuals, and teams, to view available office space and book desks for themselves and colleagues - any device, anywhere. App includes meetings rooms and parking. Making use of PowerApps, with Teams integration, it is a solution for space management.

  • IBM Analytics Engine

    IBM UNITED KINGDOM LIMITED

    Develop and deploy analytics applications using open source Apache Spark and Apache Hadoop. Customize the cluster using your own analytics libraries and open source packages. Integrate with IBM Watson Studio or third-party applications to submit jobs to the cluster.

  • Rapid7 Insight VM

    CHESS ICT LIMITED

    InsightVM provides a fully available, scalable, efficient way to collect vulnerability data, turn into answers, and minimize risk. InsightVM leverages latest analytics and endpoint technology to discover vulnerabilities in a real-time view, pinpoint their location, prioritize them, facilitate collaboration with other teams, and confirm your exposure has been reduced.