Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1735 results found

1735 results found in Lot 2: Cloud software in the category Security risk management

  • Konsolute - Azure Management Services

    KONSOLUTE

    Enhance your Azure infrastructure with our Azure Management Services, focusing on establishing robust Azure Landing Zones, optimising costs, and implementing Infrastructure as Code (IaC) for scalable, efficient, and secure cloud operations.

  • Computacenter - IBM Security - SOAR - Security Orchestration Automation and Response

    Computacenter (UK) Ltd

    SOAR is the leading platform for orchestrating and automating incident response processes. SOAR quickly and easily integrates with your organization’s existing security and IT investments. It makes security alerts instantly actionable, provides valuable intelligence and incident context, and enables adaptive response to complex cyber threats.

  • SIEM as a Service - Managed Detection and Response (MDR) (Azure Sentinel or IBM QRadar)

    VE3 GLOBAL LTD

    Our service provides round-the-clock monitoring of your IT Infrastructure to detect, investigate, notify & respond to incidents & potential threats affecting your organization. Using SIEM as a Service, VE3 provides MDR, powered by IBM QRadar & Microsoft Sentinel with real-time log analytics, threat hunting and advanced SOAR technology

  • Imperva Cloud Data Security

    QUADRIS LIMITED

    Imperva Cloud Data Security helps you understand where sensitive data resides, who accesses it and when abuse occurs in order for you to take immediate action, providing you with a comprehensive data security and compliance management solution. Offers near real-time cloud data visibility through automated discovery, classification and monitoring.

  • IBM Security - SOAR - Security Orchestration Automation and Response

    IBM UNITED KINGDOM LIMITED

    SOAR is the leading platform for orchestrating and automating incident response processes. SOAR quickly and easily integrates with your organization’s existing security and IT investments. It makes security alerts instantly actionable, provides valuable intelligence and incident context, and enables adaptive response to complex cyber threats.

  • OpView

    PERVADE SOFTWARE LIMITED

    OpView is the most flexible security monitoring system on the market which leverages a completely new database architecture to collect, correlate and report on all data types so you can successfully monitor security (SIEM), vulnerability, configuration & availability (SOC), performance, asset & flow (NOC) all in a single configurable system.

  • Sophos Intercept X Advanced with XDR Server

    PHOENIX SOFTWARE LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Snyk DevSecOps hosting

    THE SERVER LABS LTD

    Snyk is a comprehensive developer security platform that provides security intelligence, licence compliance management, self-service security education, purpose built security AI, and integrates with your existing tools and workflows. The Server Labs Cloud Security Services makes use of Snyk's platform as one solution to DevSecOps.

  • Sophos Managed Risk

    CHESS ICT LIMITED

    SophosManaged Risk is a vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. With SophosManaged Risk, our experienced analysts identify high-priority cybersecurity vulnerabilities and potential attack vectors in your environment so actions can be taken to prevent attacks.

  • Tenable Cloud Security (earlier version named Tenable.cs)

    INTEGRITY360 LIMITED

    See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.

  • Barrier Networks Email Protection for Exchange and Hosted Environments (Fortinet FortiMail)

    Barrier Networks

    VM or SaaS based, the FortiMail platform offers an security solution for on-premise and hosted email such as Office 365 and G-Suite. The standard solution offers Anti-Spam/Virus, Virus Outbreak Protection, DLP, Identity Based Encryption, and Archiving. The Advanced includes Sandbox, CDR, URL Click Protection and Business Email Compromise protection.

  • Netwrix Recovery for Active Directory

    BYTES SOFTWARE SERVICES LIMITED

    Netwrix Recovery for Active Directory helps organizations avoid security breaches and business disruptions by enabling administrators to quickly revert entire AD objects or just a single attribute to a known good state, without downtime. This solution handles AD objects, attributes, group memberships, DNS entries, Group Policy objects, and more. bssgc

  • Rapid7 - Insight ThreatCommand

    SOFTCAT PLC

    Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you to make informed decisions and rapidly respond to protect your business.

  • SolarWinds AppOptics - License

    Prosperon Networks Ltd

    SolarWinds® AppOptics is a SaaS-based simple, powerful, and affordable infrastructure and application monitoring (APM) solution. AppOptics speeds root cause analysis of application performance issues across AWS, Azure, and hybrid IT environments.

  • Barrier Networks Secure Browser / Remote Browser Isolation (RBI ConcealBrowse)

    Barrier Networks

    Protecting users against modern web based cyber attacks such as phishing and credential theft.

  • Biometrics-as-a-Service

    VIABLE DATA LTD

    Experts in biometrics and security controls, Viable Data offer Biometrics as a Service, measuring and analysing unique physical or behavioural characteristics to rapidly verify an individual’s identity. This includes fingerprints, facial recognition, iris/eye patterns, voiceprints, walking patterns (gait), sentiment analysis, typing patterns and more.

  • Biometric Security Services

    VIABLE DATA LTD

    Viable Data offer biometric security services, enabling our clients to safeguard sensitive data or access points. This includes facial recognition solutions, fingerprint services and multi-factor authentication to ensure a high level of accuracy whilst improving user experience.

  • CheckPoint CloudGuard Web Application Firewall as a service (WAFaaS)

    BYTES SOFTWARE SERVICES LIMITED

    Check Point CloudGuard WAF provides Web Application and API protection. With deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security. bssgc

  • Risk management software (Insight4GRC 4risk)

    RSM UK RISK ASSURANCE SERVICES LLP

    Risk management, assurance and compliance software that provides a complete and real time view of an organisation’s risk, control assurance and compliance profile. The system can be configured for multiple purposes including recording, monitoring and reporting of business and project risks, incidents and breaches and compliance against regulation or standards.

  • Microsoft Azure Active Directory (AD) and Entra Licenses - CoreGov

    CORE TECHNOLOGY SYSTEMS (U.K.) LIMITED

    Azure AD and Entra licensing covering Identity services in the Microsoft Cloud.

  • Forcepoint Data Guard (FDG)

    SOFTCAT PLC

    Forcepoint Data Guard (FDG) delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • Trend Micro One

    SOFTCAT PLC

    Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location.

  • Xurrent (ITSM/SIAM/ESM) - Licensing by SCC

    SPECIALIST COMPUTER CENTRES PLC

    Xurrent is the Complete Service Management platform enabling departments, like IT&HR, to work together seamlessly, including external service providers where services are outsourced. Automate requests from customer or citizens to interact with the right service providers within your organisation. Xurrent supports ITIL and fully integrates knowledge-management, time-tracking and project-management capabilities.

  • BeyondTrust Identity Security Insights

    PHOENIX SOFTWARE LIMITED

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. https://www.beyondtrust.com/products/identity-security-insights

  • Barracuda WAF as a Service

    PRIMESYS LTD

    Combine full Web Application and API Protection (WAAP) functionality with a complete set of advanced security services and solutions that protect your applications against today’s multiplying threats. Whether your applications are deployed on-premises, in the cloud, or hybrid, Barracuda Application Protection makes it easy to keep them secure and available.

  • Mimecast Awareness Training

    Cyberlab

    Mimecast Awareness Training is a security awareness training and cyber risk management platform that helps you combat information security breaches caused by employee mistakes.

  • CDW Sophos Managed Detection and Response Essentials (MDR) Server

    CDW LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Becrypt Mobile Device Management+

    BECRYPT LIMITED

    High-value MDM Servers tend not to reside in the well-protected segments of organisations’ networks, due to the nature of required connectivity to the global smartphone infrastructure. Delivered as a fully managed solution for businesses, it provides peace of mind over the security, integrity and delivery of the mobile estate

  • Barrier Networks Advanced Endpoint Compliance (OPSWAT MetaDefender IT-OT Access)

    Barrier Networks

    Leveraging the latest ZTA technologies, OPSWAT’s MetaDefender IT- OT Access Platform is a unified platform cloud solution for providing deep endpoint compliance, advanced endpoint protection, identity authorization, and secure access without hindering workflows. MetaDefender IT- OT Access is available on cloud or on-premises.

  • Active Risk Manager

    RISKONNECT ACTIVE RISK LIMITED

    Active Risk Manager (ARM) is a web-based Project, Programme and Enterprise risk management solution that delivers a configurable range of solutions (Including Risk, Incidents, Controls, Dashboard, Bowtie and Reporting) that supports effective business decision making whilst satisfying requirements across all market sectors. ARM deployment is offered via cloud or on-premise.