Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1698 results found

1698 results found in Lot 2: Cloud software in the category Security risk management

  • Cyber Data Incident Management

    OFFICELABS LIMITED

    Compliance with GDPR rules places specific legal obligations on organisations and individuals to maintain data accurately and safely. Cyber Data Incident Management from OfficeLabs provides a way to record and report activity and use workflow to action any follow on activities. Includes intuitive forms and comprehensive reporting.

  • Rapid7 Insight AppSec

    INTEGRITY360 LIMITED

    InsightAppSec provides Dynamic Application Security Testing for mature and maturing Application Security professionals. Apps are getting more and more complex, utilizing complex JavaScript frameworks, like React and Angular, that provide a richer experience and an easier path to full feature sets, but also present challenges to secure those apps.

  • Gytpol validator

    INTEGRITY360 LIMITED

    Automatic misconfiguration detection and zero-disruption remediation

  • Cyber Security Operations Centre

    LEIDOS INNOVATIONS UK LTD

    Leidos has created a UK Sovereign Cyber Security Operations Centre, leveraging the 2,900 Cyber Security professionals within the US and bringing to bear their Federal Government experience to provide UK Government customers with the best possible service. Leidos ensures an adaptive defence strategy and sustainable threat protection to outpace adversaries.

  • OTP messaging

    BOOMERANG I-COMMS LTD

    Boomerang delivers a robust two-factor authentication (2FA) messaging service, bolstering account security with one-time passcode (OTP) verification. Our solution equips developers with seamless integration tools for heightened protection against unauthorized access. Leveraging Boomerang's platform fortifies accounts, reducing risks and ensuring compliance with ISO 27001, Cyber Essentials, and Cyber Essentials Plus.

  • HashiCorp Vault - Secrets Management, Policy-as-Code and Data Encryption

    SOMERFORD ASSOCIATES LIMITED

    HashiCorp Vault secures, stores and tightly controls access to tokens, passwords, certificates and encryption keys to protect sensitive data. Security in static infrastructure relies on dedicated servers, static IP addresses and a defined perimeter. Security in dynamic infrastructure is defined by ephemeral applications and servers, verified identities and software encryption.

  • Forescout Cloud:- Risk & Exposure Management(REM)-Threat Detection and Response(TDR)

    INTEGRITY360 LIMITED

    The solution provides visibility and the cyber risk for any IP/MAC address connected cyber assets. Visualise the risk and compliance posture changes over time. Detect any cyber threats and orchestrate the response.

  • Skyhigh Cloud Platform

    INTEGRITY360 LIMITED

    Skyhigh Cloud Platform is a cloud access security broker (CASB) that enables customers to securely use over 31,000 cloud services. Skyhigh Cloud provides a single cross-cloud platform solution to gain visibility into cloud usage and risks, meet audit and compliance requirements, enforce security policies, and respond to threats.

  • Barrier Networks Crowdstrike Falcon Next Gen Security Information Event Management (SIEM)

    BARRIER NETWORKS LIMITED

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Sophos Central Intercept X Advanced with XDR and Managed Threat Response Advanced

    INTEGRITY360 LIMITED

    Sophos MTR offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want us to take, and who should be included in communications.

  • Ultima and Varonis SaaS Data Security Platform

    ULTIMA BUSINESS SOLUTIONS LTD.

    Secure data through automation, working with Ultima and Varonis. Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. Automated data security.

  • DMARC Processing and Visualisation

    NETCRAFT LTD

    DMARC is part of a portfolio of tools recommended by the NCSC that improves email security and can prevent your domains being spoofed. Netcraft’s DMARC service will provide the information you need to confidently move to a reject policy to prevent abuse, whilst not interfering with legitimate mail delivery.

  • Barrier Networks F5 Distributed Cloud (WAF & DDOS)

    BARRIER NETWORKS LIMITED

    F5 Distributed Cloud Services are SaaS-based security, networking, and application management services that enable customers to deploy, secure, and operate their applications in a cloud-native environment wherever needed–data center, multi-cloud, or the network or enterprise edge.

  • IRIS Intelligence Project and Portfolio Management Software

    IRIS INTELLIGENCE LIMITED

    IRIS Software helps teams manage projects, programs and portfolios more effectively. It facilitates communication between stakeholders from ground level to senior management, enabling efficient allocation of resources, project tracking and timely program delivery. It is a highly flexible system, supporting PMBoK, APM and PRINCE2 methodologies and tailored customer processes.

  • Information Management as a Service for Microsoft 365

    OFFICELABS LIMITED

    IMaaS is a service to deliver comprehensive information management and information security for Microsoft 365 including data held in SharePoint, Teams and OneDrive. Delivering information security, architecture, documents, records, life-cycle management. Tenancy configuration and data structure to advanced data governance and compliance management using Microsoft 365 tools.

  • Certificates

    Red Sift

    Helps you to avoid certificate related downtime and risks through real-time continuous discovery of new certificates, seamless monitoring of expiration and revocation, installation monitoring, configuration monitoring, and certificate transparency log monitoring (CT log monitoring).

  • Cloud Strategy Assurance

    SALUS DIGITAL SECURITY LIMITED

    Security review of Cloud migration, cloud development, cloud backup plans and services.

  • Computacenter - CyberArk Workforce Identity

    COMPUTACENTER (UK) LIMITED

    CyberArk workforce Identity is an IDaaS that offers full featured identity lifecycle & access management; it includes adaptive MFA/SSO and unique extra controls such as a Password Manager, adaptive Workstation MFA, Secure Browser and Web session protection

  • Thales Safenet Trusted Access

    INTEGRITY360 LIMITED

    Thales STA is a cloud-based Access-Management service combining MFA, SSO, policy, management into a single service. Validating identities, enforcing policies, applying smart SSO, organisations can ensure secure access to cloud/on-prem applications from one console. Applying pre-defined application/user based policies removes complexity and frustration while increasing security and user productivity.

  • Tenable Web App Scanning

    BYTES SOFTWARE SERVICES LIMITED

    Simple, scalable and automated vulnerability scanning for web applications. bssgc

  • Service Delivery Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empowers users to have complete control of their service delivery case management. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • CDW Palo Alto Cortex XSIAM

    CDW LIMITED

    Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents

  • Cyber Warfare Training Platform (SaaS)

    CYBEXER (UK) LTD

    The platform delivers cloud-based, scalable cyber warfare simulations, enabling organizations to train in realistic cyber threat environments. This platform offers accessible, cost-effective training solutions that are ideal for enhancing cyber readiness across various sectors through a user-friendly, adaptable training environment.

  • boxxe Druva Cloud Ranger

    BOXXE LIMITED

    Enhanced backup, recovery, and DR for core AWS services like EC2, RDS and more. Reliable protection of migrated Oracle, and SQL databases on AWS. Streamline backups of containerized AWS apps running on Kubernetes. VPC level protection, and simplified policy-based management at scale.

  • Cyber Essentials as a Service

    KICK ICT GROUP LIMITED

    We provide a multi layered cyber security solution with firewalls, anti-virus, ransomware protection, multi-factor authentication, email protection and network security. We are also able to provide Cyber Essentials support, enabling you to achieve full accreditation.

  • Darktrace Active AI Security Platform

    INTEGRITY360 LIMITED

    World-leading cyber-threat detection and real-time visibility in the Cloud. Compatible with all major Cloud providers (including AWS, Google Cloud Platform and Microsoft Azure). The service uses self-learning technology to detect threats and anomalous behaviours. Fully configurable, it allows organisations to monitor all or selected Cloud traffic, with minimal performance impact.

  • PyramidG2 Housing Management Software

    OmniLedger Limited

    PyramidG2 Housing Management software for the UK Social Housing Sector. Fully integrated database that enables registered providers to manage tenant rents, arrears, property repairs, maintenance, client case management, financials, digital engagement (SMS, online portal & mobile working) and more. Includes standard and custom report generation.

  • Check Point Harmony Browse

    LRQA

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.

  • Tenable Attack Surface Management

    BYTES SOFTWARE SERVICES LIMITED

    Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk. bssgc

  • Smart Test - Automated Testing for Workday

    KAINOS WORKSMART LIMITED

    Kainos Smart Test, built exclusively for Workday, enables non-technical users to create repeatable automated tests for HCM, Security, Financials, Payroll, Recruitment, Advanced Compensation, Talent and Performance, Learning and integrations. It improves Workday configuration accuracy, reduces operational costs and provides 85 times more test coverage.