Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1539 results found

1539 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Virtual Data Room

    Admincontrol AS

    Virtual Data Rooms (VDRs) from Admincontrol are custom-designed to streamline and support due diligence processes. In the data room institutions can share confidential documentation and perform Q&A rounds in an intuitive and secure environment. A Virtual Data Room ensures rapid, transparent and secure information sharing.

  • Digital Electronic Signatures and eSeal's

    GMO GLOBALSIGN LIMITED

    GlobalSign's Digital Signing Service (DSS) provides you with compliant, identity-based digital Signatures and Seals for your employees and organisation. GlobalSign does all of the technical/compliance parts in our eIDAS-accredited infrastructure for your Digital Signatures and Seals. Use our REST API for signing workflow integration to easily implement Signatures and Seals.

  • Sophos Managed Detection and Response Essentials (MDR) Server

    CHESS ICT LIMITED

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Sophos Managed Detection and Response Essentials (MDR) Endpoint

    Bytes Software Services

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications. bssgc

  • Falcon Exposure Management

    Phoenix Software Ltd

    CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • External Vulnerability Assessment Service

    Leidos Innovations UK Limited

    Leidos provides external vulnerability management as a service, using both the latest technologies and our team of experienced cyber analysts. They deliver assurance that your external infrastructure (web facing) is secured and any vulnerabilities are identified in the shortest possible time, reducing attack surface and mitigating risk of compromise.

  • Crowdstrike

    Grove Information Systems

    CrowdStrike Falcon is a unified set of cloud-delivered technologies that prevent all types of attacks, including malware and beyond. It offers solutions for endpoint security, IT operations, threat intelligence, cloud security, identity protection and more.

  • Sophos Central Email Advanced

    CHESS ICT LIMITED

    Sophos Email is a cloud-based secure email gateway solution built to integrate seamlessly with popular email platforms (Exchange Online, Google Suite etc..). Sophos Email is engineered to keep businesses safe from email threats such as Malware, Zero Day, Phishing, Spam while also preventing Data Loss and providing Email Encryption

  • Heimdal Security - Next-gen Antivirus, Ransomware Encryption Protection & Patch and Asset Manager

    BITZ 'N' PC'Z LIMITED

    Heimdal Security elevates your digital defense, seamlessly integrating powerful anti-virus and firewall capabilities with cutting-edge ransomware protection and vulnerability management, ensuring unparalleled security for your data and systems. This bundle includes: • Next-Gen Anti-Virus, Firewall & MDM • Ransomware Encryption Protection • Patch & Asset Management

  • Stone Secure Access Service Edge (SASE) - Cisco

    Stone Technologies Limited trading as Converge Technology Solutions

    Cisco Secure Connect is a turnkey, unified Secure Access Service Edge (SASE) solution delivering seamless, secure connectivity with a consistent operating model across premises to cloud, to make managing networking/security easy in a single dashboard. This converged platform solution brings together Cisco Networking/Security Clouds optimising troubleshooting and streamlining configuration.

  • ZScaler ZIA, ZPA, Z-App Software License and Deployment Services

    Visionist

    Strengthen your cloud security with Zscaler solutions. We offer ZIA, ZPA, and Z-App software licenses, along with expert deployment services which follow a Zero Trust Network Model, as recommended by NCSC. Provides access to legacy applications.

  • ServiceNow (ITSM/ITOM/CSM) - Licensing by SCC

    Specialist Computer Centres plc

    Our consultative approach to ServiceNow(ITSM/ITOM/CSM/HRSD/SecOps/IRM) Enterprise Service Management(ESM) licensing enables us to deliver IMPACT to your organisation. Via our team of highly skilled Solution Architects, we will work with you to define the correct approach for your needs, leveraging our knowledge as a ServiceNow customer to maximise benefits to you

  • IBM Storage Protect for Cloud for Azure

    IBM United Kingdom Ltd

    IBM Storage Protect for Cloud Azure provides cloud-based data protection for your organization’s Azure Active Directory, Azure Virtual Machines and Azure Blobs and File Storage.

  • Varonis Data Security Platform

    Bytes Software Services

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. bssgc

  • Sophos Central Intercept X Advanced for Server with XDR

    INTEGRITY360 LIMITED

    Central Intercept X Advanced for Server with Extended Detection and Response (XDR) includes all features in Central Intercept X Advanced for Server, plus powerful features for detection and remediation. Ask and answer business critical IT operations and threat hunting questions with Live Discover and respond remotely with Live Response.

  • Secure File Storage

    MegaNexus Ltd

    Secure File Storage is a cloud-based storage and sharing platform, designed to enhance file management within secure environments, VCSEs, local authorities, schools, and further education institutes. It streamlines the processes of document access, storage, and collaboration, ensuring the secure handling of sensitive information and adherence to data protection regulations.

  • Enterprise Architecture - Cloud Software

    Slowhorse Ltd

    Provision of Cloud-based tooling to deliver Enterprise Architecture and Cyber Security services, together with associated consultancy services and expertise. Slowhorse Ltd will provide/configure Cloud-hosted toolsets for Enterprise Architecture (e.g. iServer; Archi; LeanIX; Power BI) and Cyber Security and, where requested, the consultancy services to maximise the value of this tooling.

  • Sophos Intercept X Advanced

    Chess CyberSecurity Ltd

    Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.

  • BastionHub

    BLANKBOX TECHNOLOGIES LTD

    BastionHub is a fully audited and high security Privileged Access Management solution. It provides remote Just In Time access to sensitive systems or networks. It allows system owners to grant temporary fully audited access to environments with the ability to revoke access in an instance

  • ArkDNS - DNS Filtering system

    Made Purple Ltd

    ArkDNS provides AI powered DNS Filtering and Security for your network. Get protection from malware, ransomware and phishing at the DNS level protecting all of your devices. Filter domains based on categories or whitelists making sure all sites are safe for work and forcing SafeSearch on all search engines.

  • Software Product Suite

    ESPANARO LTD

    A suite of products that includes but not limited to the following products: an intelligent automated technology policy management, a network security product using advanced AI and Edge data monitoring, network communications software, a DCS based data storage solution using dynamic Attribute-Based Access Control, and a zero-trust development environment.

  • CDW Check Point Harmony Email & Collaboration

    CDW Limited

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • e2e Cloud Protective Monitoring and SOC Service

    e2e-assure Ltd

    Incident Response, Case Management, log event alert monitoring, GPG-13, threat intelligence, darkweb, IPS/IDS, traffic analysis, SOC, CERT, Reporting, Collaboration, packet capture, Audit Compliance, EDR, MDR, XDR, NDR, TDR, Privileged User, MDM, Vulnerability Assessment, Cloud Security, Sentinel, Defender, MDE, MCAS, Azure, AWS, CloudTrail, CloudWatch, GuardDuty, Security Hub, GCP, Google WorkSpace, Oracle

  • Arena

    Hicom Technology Ltd

    Market-leading compliance management system enabling multi-site/multi-asset organisations to manage essential business practices, inter-company communications and reporting processes, ensuring compliance with established regulations. Currently used by over 200,000 users in 5,000+ sites worldwide, Arena is a modular solution providing business with a powerful tool that helps reduce business risk.

  • CDW Proofpoint Advanced Package

    CDW Limited

    Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings. Proofpoint CORE Plus - Requires CORE P0 or CORE P1

  • Cyber Security Network Sensor

    Actionable Ltd

    REACH CYBER provides the latest generation cyber security network sensor. Using analytics and AI to not only protect and detect cyber breaches, but also provide the right data you need to identify vulnerabilities and attack vectors. The platform incorporates the REACH data acquisition engine for precision cyber data analytics.

  • CrowdStrike Falcon® Counter Adversary Operations

    Computacenter (UK) Ltd

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.

  • Netscout Arbor Enterprise Manager (DDoS Protection)

    Khipu Networks Limited

    This service provides a scalable inline threat prevention capability which can tune for your environment and keep the mass of online threats at bay from your infrastructure and your important business services.

  • SecurEnvoy MFA / Identity Access Platform

    CYBERLAB CONSULTING LTD

    SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.

  • Trustmarque Palo Alto Prisma Access

    Trustmarque Solutions Limited

    Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.