Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3798 results found

3798 results found in Lot 2: Cloud software in the category Application security

  • KnowBe4 Security Awareness Training platform

    Fordway

    KnowBe4 is the world's most popular integrated platform for awareness training combined with simulated phishing attacks. On-demand, interactive, engaging training with over 1000 course modules available, the largest online database available anywhere. Fully automated simulated phishing attacks, 4000+ email templates with unlimited usage. Enterprise-strength reporting for both training and phishing.

  • MUNIvers

    AGILYX EMEA LTD

    MUNIvers - the revolutionary Salesforce-built solution designed to empower local government organisations and strengthen the communities they serve. Harnessing the latest in AI and revenue management technology, MUNIvers delivers seamless data integration and sophisticated billing and regulatory management capabilities

  • Tessian DLP

    INTEGRITY360 LIMITED

    Adaptive Email DLP uses behavioral AI to learn about employees’ normal email sending behaviors, their trusted relationships and how they communicate sensitive data. It analyzes each email to detect anomalous behavior, notifying admins of potential data loss incidents. It warns the user in real-time and prevents sensitive data-loss through email.

  • Track Record Facilities

    Jacobs U.K. Limited

    Many customers managing building data need to comply with the Building Safety Act. Budget restrictions and need for a “digital golden thread” drives businesses to seek efficiencies and tools to digitisation. Track Record is a configurable, auditable, user-friendly web-based and mobile app solution used to demonstrate statutory and regulatory compliance.

  • Activtrak - Compliance, Security and Productivity

    Glemnet Ltd

    ActivTrak is a workforce productivity and analytics application that helps organizations understand how and what people do at work. Our cloud-based user activity monitoring software provides contextual data and insights that enable mid-market organizations to be more productive, secure, and compliant.

  • CMS websites

    JBi Digital

    We create user-friendly CMS websites that make life easy by harnessing the full benefits of a customisable, flexible and scalable CMS with our design, build and hosting services. We prioritise understanding your objectives & values, then identify and recommend the most bespoke & beneficial solution to help achieve your goals.

  • Palo Alto Prisma Cloud

    Bytes Software Services

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments. bssgc

  • Infreemation - Blue Badge Case Management System

    Digital Interactive Ltd

    Infreemation Blue Badge is a case management system for receiving, vetting, approving (and rejecting) Blue Badges

  • CDW Sophos Managed Detection and Response Complete (MDR) Endpoint

    CDW Limited

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • USM Anywhere SIEM Licences

    MONDAS CONSULTING LTD

    Purchase AT&T USM Anywhere SIEM licences to utilise the power of USM Anywhere to collate log data from all of your Microsoft security tools and generate alarms for a SOC team to triage. USM Anywhere can remediate these alarms using powerful automated playbook actions.

  • CyberArk PAM Self-Hosted

    CyberIAM Holdings Ltd

    CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics.

  • boxxe Sophos Intercept X Advanced with XDR Server

    BOXXE LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Cellma

    RioMed Ltd

    RioMed's Cellma application is a health information system designed to provide dynamic and integrated digital solutions to effectively manage all aspects of healthcare and promote the transition to a truly ‘paperless’ infrastructure. The information captured helps improve the quality, efficiency and safety of patient data.

  • Barracuda 24X7 O365 Detection & Response

    Southern Communications Corporate Solutions T/A SCG Corporate

    Office 365 Security Monitoring is a managed security product that monitors Office 365 activity using analytics platform, Security Information and Event Management, threat intelligence and 27/7/365 Security Operations Centre.Identification of threat-like behavior such as unauthorized access to cloud mailboxes, admin changes in the environment, impossible logins and brute force attacks.

  • Aiimi Insight Engine – Legacy Decommissioning

    Aiimi Ltd

    Insight Engine connects to and ingests information from a multitude of source systems, including both data and documents via API, data export ingestion or from databases and file shares. Once made available through our search and discovery interface, the legacy application can be safely decommissioned.

  • KnowBe4 SecurityCoach

    Softcat Limited

    SecurityCoach is the first real-time security coaching product that delivers immediate feedback to users at the moment of risky behaviour. It leverages event data from your existing security stack to deliver real-time coaching, reinforces your security culture and turns insecure user behaviour into an opportunity

  • Powered by Neo: Advanced Complaints Management

    NEO TECHNOLOGY LIMITED

    Neo Technology's solution revolutionises complaints management, offering features like triage and routing, timeline control, ombudsman engagement tracking, follow-on repairs, a complaints dashboard, and enhanced workflow and action plan tracking for compliance, customer satisfaction, operational efficiency, and data-driven insights.

  • uZero

    UrbanTide Limited

    uZero, a cloud-based data insights platform, maps, identifies and predicts fuel poverty. Leveraging advanced AI analysis, uZero seamlessly integrates anonymised real-time smart meter data with multiple cross-sector datasets, facilitating predictions of fuel poverty to target Net Zero strategy, retrofit programmes, grant funding and decision making to support fuel poor households.

  • Check Point Harmony SASE

    Charterhouse Voice & Data

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • Aiimi Insight Engine – Search & Discovery

    Communication-STEM Ltd

    The Aiimi Insight Engine is our unique discovery platform. It works alongside you, using AI to serve relevant information and insight swiftly and securely. Whether you’re complying with GDPR, using enterprise search, decommissioning legacy platforms, or getting the most accurate data science insights, the Insight Engine adapts to your needs.

  • Conversational AI Platform - EVA

    ENTERPRISE RPA LIMITED

    EVA powered by DRUID is an end-to-end platform for building conversational business applications and virtual assistants specialised in completing business task. EVA offers users the ability to ask questions and get accurate responses, but also to perform complex tasks by integrating with multiple existing or legacy applications in the organization.

  • OKTA

    Softcat Limited

    Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for both cloud based and on-premise applications.

  • GlobalSign Certificate Products

    GMO GLOBALSIGN LIMITED

    GlobalSign provides an array of digital certificates including TLS (public and private), CodeSigning, Document Signing and Authentication certificate. Suppling DV, OV, EV SSL and Code Signing certificates for single, multiple and complex domains/sub-domain sites. All your certificate needs met by GlobalSign.

  • Cribl Stream

    4 DATA SOLUTIONS LIMITED

    Cribl Stream is a vendor-agnostic observability pipeline that gives you the flexibility to collect, reduce, enrich, normalize, and route data from any source to any destination within your existing data infrastructure. Achieve full control of your data, empowering you to best support your business goals.

  • EIS (Cantium) BitWarden

    Cantium Business Solutions

    EIS (the trading arm of Cantium Business Solutions) provides BitWarden to help secure passwords, passkeys and sensitive information. Specialising in aiding with all aspects of BitWarden, we collaborate with the complete application suite within BitWarden's portfolio, addressing business obstacles, enhancing workflows, increasing efficiency and minimising costs.

  • Tenable PCI-ASV

    Softcat Limited

    An add-on to Tenable Vulnerability Management. Unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organization complies with PCI DSS. Process strictly follows PCI Compliance Guidelines, ensuring vulnerabilities don't exist for more than 90-days on networks that involve payment card transactions.

  • Computacenter - ProofPoint Insider Threat Management

    Computacenter (UK) Ltd

    Proofpoint-Insider-Threat-Management takes a people-centric approach to protect your organisation against data-loss/malicious-acts/brand-damage, involving insiders. We defend against authorised users acting maliciously/negligently/unknowingly. And correlate user activity and data movement to protect you from insider-led data breaches. Plus, we detect risky behaviour in real-time to give you easy to understand evidence of wrongdoing.

  • Microsoft Power Platform Licenses - CoreGov

    Core

    Using workflow we can provide extensive business process automation to greatly reduce existing manual processes and save time for those who need to understand them.

  • Web application firewall (WAF)

    Jisc Services Ltd

    The Jisc Web Application Firewall (WAF) service is based on Fortinet's FortiWeb WAF, providing a cloud-based service that makes your websites safer, faster and more reliable. The service guards against DDoS attacks and protects against data breaches resulting from malicious cyber-attacks and vulnerability exploits.

  • Computacenter - CrowdStrike Falcon Next Gen SIEM

    Computacenter (UK) Ltd

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.