Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1698 results found

1698 results found in Lot 2: Cloud software in the category Security risk management

  • Computacenter - IBM Security - Trusteer Pinpoint

    COMPUTACENTER (UK) LIMITED

    IBM Trusteer helps organizations establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and patented machine learning, Trusteer provides a holistic approach to identifying customers, without negatively impacting user experience. Trusteer runs over 40 billion application accesses monthly and over 1 billion monthly user sessions.

  • CheckPoint CloudGuard Cloud Security Posture Management (CSPM)

    SOFTCAT PLC

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.

  • Falcon Exposure Management

    PHOENIX SOFTWARE LIMITED

    CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • External Vulnerability Assessment Service

    LEIDOS INNOVATIONS UK LTD

    Leidos provides external vulnerability management as a service, using both the latest technologies and our team of experienced cyber analysts. They deliver assurance that your external infrastructure (web facing) is secured and any vulnerabilities are identified in the shortest possible time, reducing attack surface and mitigating risk of compromise.

  • Crowdstrike

    Grove Information Systems

    CrowdStrike Falcon is a unified set of cloud-delivered technologies that prevent all types of attacks, including malware and beyond. It offers solutions for endpoint security, IT operations, threat intelligence, cloud security, identity protection and more.

  • Heimdal Security - Next-gen Antivirus, Ransomware Encryption Protection & Patch and Asset Manager

    BITZ 'N' PC'Z LIMITED

    Heimdal Security elevates your digital defense, seamlessly integrating powerful anti-virus and firewall capabilities with cutting-edge ransomware protection and vulnerability management, ensuring unparalleled security for your data and systems. This bundle includes: • Next-Gen Anti-Virus, Firewall & MDM • Ransomware Encryption Protection • Patch & Asset Management

  • Imperago Door Access Control

    HFX LIMITED

    Cloud based Imperago door Access Control is simple to install, cost effective, robust, easy to use and up and running in days. See at a glance, exactly where your staff are. Imperago uses card or biometric technology, using the latest smart devices. Utilising the latest contactless and temperature sensing technology.

  • Stone Secure Access Service Edge (SASE) - Cisco

    Stone Technologies Limited Trading as Converge Technology Solutions

    Cisco Secure Connect is a turnkey, unified Secure Access Service Edge (SASE) solution delivering seamless, secure connectivity with a consistent operating model across premises to cloud, to make managing networking/security easy in a single dashboard. This converged platform solution brings together Cisco Networking/Security Clouds optimising troubleshooting and streamlining configuration.

  • ZScaler ZIA, ZPA, Z-App Software License and Deployment Services

    VISIONIST LIMITED

    Strengthen your cloud security with Zscaler solutions. We offer ZIA, ZPA, and Z-App software licenses, along with expert deployment services which follow a Zero Trust Network Model, as recommended by NCSC. Provides access to legacy applications.

  • ServiceNow (ITSM/ITOM/CSM) - Licensing by SCC

    SPECIALIST COMPUTER CENTRES PLC

    Our consultative approach to ServiceNow(ITSM/ITOM/CSM/HRSD/SecOps/IRM) Enterprise Service Management(ESM) licensing enables us to deliver IMPACT to your organisation. Via our team of highly skilled Solution Architects, we will work with you to define the correct approach for your needs, leveraging our knowledge as a ServiceNow customer to maximise benefits to you

  • Varonis Data Security Platform

    BYTES SOFTWARE SERVICES LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. bssgc

  • Sophos Central Intercept X Advanced for Server with XDR

    INTEGRITY360 LIMITED

    Central Intercept X Advanced for Server with Extended Detection and Response (XDR) includes all features in Central Intercept X Advanced for Server, plus powerful features for detection and remediation. Ask and answer business critical IT operations and threat hunting questions with Live Discover and respond remotely with Live Response.

  • Video and Image Analysis

    ROKE MANOR RESEARCH LIMITED

    Roke is pioneering Machine Learning & AI powered Image and Video Analytics, our platforms rapidly process media content at scale and performs Deep Learning based content detection, moderation, summarisation and linking functions. A core service provided to UK law enforcement automatically detects and categorise Child Sexual Exploitation images and videos.

  • Secure File Storage

    MEGANEXUS LTD

    Secure File Storage is a cloud-based storage and sharing platform, designed to enhance file management within secure environments, VCSEs, local authorities, schools, and further education institutes. It streamlines the processes of document access, storage, and collaboration, ensuring the secure handling of sensitive information and adherence to data protection regulations.

  • Enterprise Architecture - Cloud Software

    Slowhorse Ltd

    Provision of Cloud-based tooling to deliver Enterprise Architecture and Cyber Security services, together with associated consultancy services and expertise. Slowhorse Ltd will provide/configure Cloud-hosted toolsets for Enterprise Architecture (e.g. iServer; Archi; LeanIX; Power BI) and Cyber Security and, where requested, the consultancy services to maximise the value of this tooling.

  • BastionHub

    BLANKBOX TECHNOLOGIES LTD

    BastionHub is a fully audited and high security Privileged Access Management solution. It provides remote Just In Time access to sensitive systems or networks. It allows system owners to grant temporary fully audited access to environments with the ability to revoke access in an instance

  • Check Point CloudGuard Cloud Security Posture Management (CSPM)

    INTEGRITY360 LIMITED

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.

  • Check Point CloudGuard Cloud Native Application Protection Platform (CNAPP)

    INTEGRITY360 LIMITED

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.

  • Check Point CloudGuard Code Security (Spectral)

    INTEGRITY360 LIMITED

    CloudGuard Code Security provides automated tools to detect code vulnerabilities, identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends. With CloudGuard Code Security, organizations can prevent exposing API keys, tokens and credentials, and remediate security misconfigurations. CloudGuard Code Security ensures security without compromising productivity.

  • boxxe Opswat MetaDefender Core

    BOXXE LIMITED

    OPSWAT's MD-Core consists of Multiscannng, Deep CDR, Filescan (Sandbox), DLP, File Based Vulnerability, Software Supply Chain for the protection against malware threats. OPSWAT has complimentary products and features such as Managed File Transfer (aka Vault), Diode Technology (CDS, IDG), and an umber of Access and IOT Solutions.

  • CDW Check Point Harmony Email & Collaboration

    CDW LIMITED

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • e2e Cloud Protective Monitoring and SOC Service

    E2E-ASSURE LIMITED

    Incident Response, Case Management, log event alert monitoring, GPG-13, threat intelligence, darkweb, IPS/IDS, traffic analysis, SOC, CERT, Reporting, Collaboration, packet capture, Audit Compliance, EDR, MDR, XDR, NDR, TDR, Privileged User, MDM, Vulnerability Assessment, Cloud Security, Sentinel, Defender, MDE, MCAS, Azure, AWS, CloudTrail, CloudWatch, GuardDuty, Security Hub, GCP, Google WorkSpace, Oracle

  • Arena

    Hicom Technology Ltd

    Market-leading compliance management system enabling multi-site/multi-asset organisations to manage essential business practices, inter-company communications and reporting processes, ensuring compliance with established regulations. Currently used by over 200,000 users in 5,000+ sites worldwide, Arena is a modular solution providing business with a powerful tool that helps reduce business risk.

  • Cyber Security, Policy Management & Compliance Platform

    POLICY MONITOR LIMITED

    Policy Monitor provides a cybersecurity management platform, Cyber Security Policy Monitor (CSPM). CSPM gives you a centralised platform to support your organisation through complex industry-certified accreditations, to create and implement internal security policies, train your staff, scan for vulnerabilities and establish best practices to provide the best defence against criminals.

  • Third Party Assurance Platform

    TMC3 LIMITED

    OneTrust Third-Party Management streamlines third party assurance for public sector entities, offering comprehensive risk monitoring, due diligence automation, and robust compliance tools. Our solution effectively manages third-party risks across security, privacy, and ESG domains, enhancing trust and compliance.

  • CDW Proofpoint Advanced Package

    CDW LIMITED

    Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings. Proofpoint CORE Plus - Requires CORE P0 or CORE P1

  • Micro Focus, now OpenText - NetIQ Identity Intelligence on SaaS

    MICRO FOCUS SOFTWARE UK LTD

    NetIQ Identity Intelligence service provides a cloud-based enterprise service that is intended: To assess risk based on insights from identity information Apply methods to remove excessive, anomalous, or erroneous entitlements Improve the ongoing identity governance process, including risk reporting

  • Cyber Security Network Sensor

    ACTIONABLE LTD

    REACH CYBER provides the latest generation cyber security network sensor. Using analytics and AI to not only protect and detect cyber breaches, but also provide the right data you need to identify vulnerabilities and attack vectors. The platform incorporates the REACH data acquisition engine for precision cyber data analytics.

  • CrowdStrike Falcon® Counter Adversary Operations

    COMPUTACENTER (UK) LIMITED

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.

  • Netscout Arbor Enterprise Manager (DDoS Protection)

    KHIPU NETWORKS LIMITED

    This service provides a scalable inline threat prevention capability which can tune for your environment and keep the mass of online threats at bay from your infrastructure and your important business services.