Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3798 results found

3798 results found in Lot 2: Cloud software in the category Application security

  • CDW Sophos Central Device Encryption (CDE)

    CDW Limited

    Sophos Central Device Encryption lets you centrally manage Windows BitLocker and macOS FileVault native device encryption. With Sophos Central’s web-based management, there is no server to deploy and no need to configure back-end key servers.

  • Microsoft 365 Services

    TECHNOLOGY TRANSFORMATION GROUP LTD

    Technology Transformation Group assesses your organisation's software needs to develop a tailored Microsoft 365 Service strategy, leveraging the full potential of your licenses. We analyse existing licensing agreements, identifying cost-saving opportunities and offer guidance on product features such as Word, Excel, and Teams for enhanced productivity, security and team empowerment.

  • UK Sovereign Symmetric Key Agreement - Arqit

    Nine23

    UK Sovereign Managed Cloud PaaS for Symmetric Key Agreement (Arqit - SKA(PaaS)™). Secure by design, it hardens cyber security across the network and data communications by generating symmetric encryption keys between end-points. Manage individual and group key sessions with policy enforcement. Supports existing encryption algorithms to layer into existing network.

  • Netwrix StealthINTERCEPT

    Softcat Limited

    Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.

  • ThreatMatch - Cyber Threat Intelligence Sharing Platform

    Security Alliance Limited

    The ThreatMatch Intelligence Portal / Platform is collaborative, purpose-built for intelligence sharing. ThreatMatch Community Subscription enables the development and operation of secure, trusted communities, based on sector, geography or collaborative efforts. Quickly share intelligence across the whole community and allow members of the community to share their own intelligence.

  • Logpoint Converged SIEM and SOAR

    CYBERLAB CONSULTING LTD

    Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) provides monitoring, detection, alerting of security events/incidents. Provids a centralised view of the security posture of an IT infrastructure to view activities within an environment. Also enables automated playbooks in response to events.

  • IBM Security - Verify

    CSI Limited

    IBM Security Verify is a comprehensive cloud-native platform of IAM capabilities. It includes SSO functionality to securely connect users with resources, MFA functionality to conveniently and safely authenticate users, and AI-driven dynamic adaptive access to continuously risk-assess user sessions to keep your resources safe.

  • Disclosures Manager - Disclosure and Barring Service (DBS) services

    Atlantic Data

    Atlantic Data's Disclosures service provides organizations with an online platform for processing, administering, and managing criminal record checks. This service connects directly to the DBS through its eBulk service. Disclosures Manager is highly configurable with a comprehensive suite of management tools to assist organisations to manage and oversee these checks.

  • KPMG Cyber Risk Insights, risk quantification software

    KPMG LLP

    KPMG Cyber Risk Insights is an intuitive Cyber Risk Quantification (CRQ) SaaS product. Using a threat-led and financial modelling approach, it accurately assess the likelihood and impact of cyber-attacks. Cyber Risk Insights helps articulate your risk exposure in business terms, and prioritise defence capabilities and controls that maximise risk reduction.

  • Microsoft Entra Internet Access  (PREVIEW

    Phoenix Software Ltd

    Microsoft Entra ID Governance is an identity governance solution that enhances productivity, strengthens security, and facilitates compliance. It automates identity and access lifecycle management, provides visibility, and allows delegation to business groups. Key features include identity lifecycle management, access governance, and secure privileged access for administration.

  • Computacenter - IBM Netezza as a Service

    Computacenter (UK) Ltd

    IBM Netezza Performance Server is a fully managed, cloud native data warehouse. With advanced in-database analytics capabilities, it enables you to do data science and machine learning with data volumes scaling into the petabytes.

  • iboss Zero Trust Core Package

    Axians Networks Limited

    iboss is a cloud based Secure Web Gateway platform.  iboss utilises containerised cloud architecture allowing customers to migrate from legacy appliances, maintaining 100% dedicated IP address space in the cloud. PDNS intergration, and admin created GDPR Zones UK datacentres. Includes Core Filtering, Malware detection and Data Loss Prevention as SaaS

  • NQM Project Management Platform

    NquiringMinds Ltd

    NQM Project Management Platform is a task and project management platform for working across organizations.

  • Arcus Corporate Governance

    Arcus Global Limited

    Arcus Corporate Governance aids teams managing complaints, freedom of information requests, personal data rights requests, MP and Member enquiries, and other corporate requests. It enables these requests to be logged, allocated, tracked, and aids in collation of answers and approvals. Online forms and publishing FOI responses is included.

  • Pathlock Cloud Application Access Governance (AAG)

    Resulting Ltd

    Pathlock Cloud AAG provides cross application Identity and Access Security Governance, Risk and Compliance (GRC) allowing you to monitor and cleanse system access and authorisations, detect and manage Segregation of Duties (SoD) violations, detect fraud, and automate joiner, mover, leaver processes and privileged (emergency) Access.

  • Cyber Vulnerability Research

    Leidos Innovations UK Limited

    The Vulnerability Research Service provides access to Leidos’ in-house Offensive Cyber Operations (OCO) Research and Development (IR&D) programme, operated globally. It is an innovative attack and exploitation capability designed to conduct exploit development, and technology research against defined target system, be they internal, or external.

  • UK Sovereign Zero Trust (ZTNA) - Software Defined Perimeter - Appgate

    Nine23

    UK Sovereign Private Cloud Hosted ZTNA Gateway, delivered as a managed service. People-Defined Security, deliver fast, Zero Trust access connections for your users everywhere to the resources they need anywhere. Can be used for connectivity to public sector networks such as LECN, PSN, HSCN and Internet/Public Cloud services.

  • SMS NHS

    Boomerang I-Comms Ltd

    Boomerang aids healthcare providers in achieving better outcomes at lower costs through efficient messaging solutions. Our communication service streamlines engagement across various channels, automating tasks to reduce missed appointments, promote messaging and automate manual workforce management burdens. ISO-27001, Cyber Essentials,Cyber Essentials Plus accredited

  • EIS (Cantium) Tenable Licensing

    Cantium Business Solutions

    Tenable provides the most accurate information about dynamic assets and vulnerabilities in ever-changing environments. EIS (the trading arm of Cantium) goes beyond providing licenses; offering consultancy services ensuring organisations procure the most suitable licenses for their requirements. EIS provides support throughout the entire process, including design, implementation and ongoing management.

  • Social Rx Connect

    promatica digital

    Social Rx is an end-to-end digital social prescribing solution for social prescribing teams to manage cases and get population-level insights with a range of dashboard and reports. The product is interoperable with the main GP IT systems.

  • QKVIN Customer Screening

    DLT APPS LIMITED

    Qkvin's digital identity empowers organisations to revolutionise how customers interact, ensuring safety and security—every customer you onboard successfully are assigned a digital identity after successful verification.

  • Neotas Investigative SaaS Platform

    Neotas

    Neotas offers online investigative enhanced due diligence solutions through its AI-driven SaaS platform that harnesses the power of OSINT to identify, understand, and connect both structured, unstructured data across the surface, deep, and the dark web to help private and public sector analyse digital footprint of any given entity.

  • Mimecast Awareness Training

    INTEGRITY360 LIMITED

    Mimecast Awareness Training is a security awareness training and cyber risk management platform that helps you combat information security breaches caused by employee mistakes.

  • Intranet and Digital Workplace in Microsoft SharePoint 365

    NEXER DIGITAL LTD

    Nexer is a global Gold Partner to Microsoft. We help organisations make better use of Microsoft products, through user research, design, implementation and ongoing support. We have our own intranet product based on SharePoint, Core, that integrates with Teams, Viva and Microsoft 365. We also offer "out-of-the-box" SharePoint solutions.

  • CheckPoint CloudGuard Network Security - For Azure Virtual WAN

    Bytes Software Services

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure. bssgc

  • MACS IBM Control Desk

    macseu

    MACS IBM Control Desk for cloud based management of IT assets (ITAM) and IT services (ITSM) according to ITIL standards and processes. Simplifying IT support needs for users and infrastructures, they reduce costs and increase user satisfaction through self-service, automated service management and integrated, best-practice based on an ITIL approach.

  • CDW BlueVoyant - Digital Risk Protection (DRP)

    CDW Limited

    Digital Risk Protection, detects and eliminates cyber threats before impact. Continuously monitoring, threat data sources, proprietary global DNS data sets, private cybercriminal instant messaging channels. Identify and validates threats, providing actionable countermeasures. Always accessible to add context and facilitate takedown phishing sites, domain lookalikes, social media impersonations, fraudulent apps.

  • BlackBerry AtHoc Critical Communication & Event Management

    BlackBerry UK Limited

    BlackBerry® AtHoc is trusted by 2000+ organizations globally to unify their crisis communications. It offers a whole new level of protection for your people and gives leaders the information they need to make critical safety decisions.

  • Oracle Integration Services

    DEFENCE DATASEC LTD

    "Oracle Integration Services is a robust platform that facilitates seamless integration of diverse applications,data sources, and services.It enables organizations to automate workflows,streamline business processes, and enhance connectivity across their IT ecosystem.With features like pre-built adapters and extensive orchestration capabilities, this service empowers businesses to achieve agility,efficiency,and innovation in their operations.

  • Self-managed TAK Server

    Rowden Technologies Ltd

    Rowden's Self-managed TAK Server offers a foundational, cost-effective cloud solution on AWS or Hybrid platforms with custom security design, Docker-based deployment and basic PostgreSQL database features. Perfect for teams requiring straightforward, secure communication with minimal support.