Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2472 results found

2472 results found in Lot 2: Cloud software in the category Security

  • E-learning

    VINCI LEGAL LIMITED

    E-learning across a range of compliance, diversity and health & safety topics. Accompanied with a learning management system to deliver, track and report on course completion.

  • UK Sovereign Symmetric Key Management - Arqit

    NINE23 LTD

    UK Sovereign Managed Cloud PaaS for Symmetric Key Management (Arqit - SKA(PaaS)™). Secure by design, it hardens cyber security across the network and data communications by generating symmetric encryption keys between end-points. Manage individual and group key sessions with policy enforcement. Supports existing encryption algorithms to layer into existing network.

  • Computacenter - IBM Security - SOAR - Security Orchestration Automation and Response

    Computacenter (UK) Ltd

    SOAR is the leading platform for orchestrating and automating incident response processes. SOAR quickly and easily integrates with your organization’s existing security and IT investments. It makes security alerts instantly actionable, provides valuable intelligence and incident context, and enables adaptive response to complex cyber threats.

  • SIEM as a Service - Managed Detection and Response (MDR) (Azure Sentinel or IBM QRadar)

    VE3 GLOBAL LTD

    Our service provides round-the-clock monitoring of your IT Infrastructure to detect, investigate, notify & respond to incidents & potential threats affecting your organization. Using SIEM as a Service, VE3 provides MDR, powered by IBM QRadar & Microsoft Sentinel with real-time log analytics, threat hunting and advanced SOAR technology

  • Imperva Cloud Data Security

    QUADRIS LIMITED

    Imperva Cloud Data Security helps you understand where sensitive data resides, who accesses it and when abuse occurs in order for you to take immediate action, providing you with a comprehensive data security and compliance management solution. Offers near real-time cloud data visibility through automated discovery, classification and monitoring.

  • IBM Security - SOAR - Security Orchestration Automation and Response

    IBM UNITED KINGDOM LIMITED

    SOAR is the leading platform for orchestrating and automating incident response processes. SOAR quickly and easily integrates with your organization’s existing security and IT investments. It makes security alerts instantly actionable, provides valuable intelligence and incident context, and enables adaptive response to complex cyber threats.

  • ServiceNow ITOM Consulting service

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions Ltd offers expert ServiceNow IT Operations Management (ITOM) consulting services for government agencies. Our solutions optimize IT infrastructure management, automate workflows, and enhance operational efficiency. With our expertise, agencies can improve service reliability, reduce downtime, and align IT operations with organizational goals effectively.

  • Snyk DevSecOps hosting

    THE SERVER LABS LTD

    Snyk is a comprehensive developer security platform that provides security intelligence, licence compliance management, self-service security education, purpose built security AI, and integrates with your existing tools and workflows. The Server Labs Cloud Security Services makes use of Snyk's platform as one solution to DevSecOps.

  • AWS Marketplace

    FULLPROXY LIMITED

    AWS Marketplace is a curated digital catalog that makes it easy for customers to find, buy, and quickly deploy third-party software and services to build solutions on Amazon Web Services (AWS). With AWS Marketplace, you can streamline your software procurement process, reduce costs, and benefit from flexible pricing models.

  • Sophos Managed Risk

    CHESS ICT LIMITED

    SophosManaged Risk is a vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. With SophosManaged Risk, our experienced analysts identify high-priority cybersecurity vulnerabilities and potential attack vectors in your environment so actions can be taken to prevent attacks.

  • Tenable Cloud Security (earlier version named Tenable.cs)

    INTEGRITY360 LIMITED

    See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.

  • SAP Digital Supplier Network

    VE3 GLOBAL LTD

    The SAP Digital Supplier Network membership offers a comprehensive global solution, catering to buyers and suppliers across 190+ countries. It's accessible in multiple languages and ensures regulatory compliance for transactions across diverse markets.

  • Axiom

    4 DATA SOLUTIONS LIMITED

    Axiom is a next-generation data analytics solution built to take advantage of the cloud. Axiom is built from the ground up to ingest and store petabytes of data at industry-leading efficiency. With wide compatibility with existing agents, log shippers, languages, and services. Axiom finally provides data analytics for the masses.

  • Barrier Networks Email Protection for Exchange and Hosted Environments (Fortinet FortiMail)

    Barrier Networks

    VM or SaaS based, the FortiMail platform offers an security solution for on-premise and hosted email such as Office 365 and G-Suite. The standard solution offers Anti-Spam/Virus, Virus Outbreak Protection, DLP, Identity Based Encryption, and Archiving. The Advanced includes Sandbox, CDR, URL Click Protection and Business Email Compromise protection.

  • CDW Microsoft Office 365 Extra File Storage

    CDW LIMITED

    Should you require additional space over and above the space made available per Office 365 user, then this can be purchased on a per gigabyte (GB) per month basis.

  • Netwrix Recovery for Active Directory

    BYTES SOFTWARE SERVICES LIMITED

    Netwrix Recovery for Active Directory helps organizations avoid security breaches and business disruptions by enabling administrators to quickly revert entire AD objects or just a single attribute to a known good state, without downtime. This solution handles AD objects, attributes, group memberships, DNS entries, Group Policy objects, and more. bssgc

  • Cisco Umbrella

    Creative Networks

    Cisco Umbrella is a cloud-based security service safeguarding devices from online threats by blocking malicious websites and content. It provides visibility into internet activity, defends against malware and phishing, and integrates with other security tools for a comprehensive defence against cyberattacks.

  • Ultima AntiSocial Blocklist

    ULTIMA BUSINESS SOLUTIONS LTD.

    The AntiSocial Engineer's AntiSocial Blocklist is an extensive collection of potentially malicious domains. Avoiding web phishing through blocking servers that impersonate companies and common brands. The data provided used to protect employees from phishing and vulnerabilities. Helps proactively avoid web based phishing through employee protection on the internet.

  • Rapid7 - Insight ThreatCommand

    SOFTCAT PLC

    Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you to make informed decisions and rapidly respond to protect your business.

  • SolarWinds AppOptics - License

    Prosperon Networks Ltd

    SolarWinds® AppOptics is a SaaS-based simple, powerful, and affordable infrastructure and application monitoring (APM) solution. AppOptics speeds root cause analysis of application performance issues across AWS, Azure, and hybrid IT environments.

  • Barracuda Cloud to Cloud Backup (CCB)

    QUADRIS LIMITED

    Barracuda Cloud-to-Cloud Backup gives you the flexibility to backup and restore Microsoft 365 Teams, Exchange, SharePoint, OneDrive, and OneNote data with highly granular detail, and offers complete, granular protection of your data with point-in-time retrieval, and both scheduled and on-demand backup, in addition, data is deduplicated and compressed.

  • Barrier Networks Secure Browser / Remote Browser Isolation (RBI ConcealBrowse)

    Barrier Networks

    Protecting users against modern web based cyber attacks such as phishing and credential theft.

  • Patronum - Google Workspace Manager by Bespin Labs

    BESPIN LABS LIMITED

    Your Google Workspace Manager - Providing a better way to manage your Google Workspace.

  • ServiceNow Reporting and Analytics service

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions Ltd specializes in ServiceNow Reporting and Analytics services, tailored for government departments. Our expert consultants collaborate closely with government entities to implement robust reporting and analytics solutions on the ServiceNow platform. We ensure data-driven decision-making, enhanced insights, and improved government service delivery, aligning with specific governmental objectives.

  • Biometrics-as-a-Service

    VIABLE DATA LTD

    Experts in biometrics and security controls, Viable Data offer Biometrics as a Service, measuring and analysing unique physical or behavioural characteristics to rapidly verify an individual’s identity. This includes fingerprints, facial recognition, iris/eye patterns, voiceprints, walking patterns (gait), sentiment analysis, typing patterns and more.

  • VerseOne Microsoft Integration via API to Products like Active Directory, M365, SharePoint and More

    VERSEONE GROUP LTD

    VerseOne is a Microsoft preferred Independent Software Vendor (ISV) and AI Cloud Partner. We integrate with Active Directory for user permissions, Single Sign ON (SSO) logins via Open ID Connect (OIDC), staff directories and more. Our SharePoint, OneDrive, Outlook, M365, PowerBI and Teams integrations power collaboration.

  • Biometric Security Services

    VIABLE DATA LTD

    Viable Data offer biometric security services, enabling our clients to safeguard sensitive data or access points. This includes facial recognition solutions, fingerprint services and multi-factor authentication to ensure a high level of accuracy whilst improving user experience.

  • CheckPoint CloudGuard Web Application Firewall as a service (WAFaaS)

    BYTES SOFTWARE SERVICES LIMITED

    Check Point CloudGuard WAF provides Web Application and API protection. With deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security. bssgc

  • EIS (Cantium) AI Penetration Testing

    Cantium Business Solutions

    EIS' (the trading arm of Cantium Business Solutions) range of cutting-edge cybersecurity solutions integrates human intelligence, artificial intelligence, and machine learning technologies to proactively identify and respond to the ever-evolving threat landscape. We offer real-time detection/ response capabilities across cloud-based services and on-premises environments, reducing risk of exploitation and compromise.

  • Microsoft Power BI: Data Visualisation

    CLOUD COVER IT SERVICES LTD T/A Flyte

    See your company's data in new ways with interactive data visualisation BI tools from Microsoft Power BI. Visualise data through interactive, real-time dashboards, and analytics that generate actionable insights to scale your business. Real-time analytics: Know what’s happening now, not just in the past