Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Netwrix Password Policy Enforcer

    INTEGRITY360 LIMITED

    Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware.

  • Cyber Resilient Integrated Workspace (CRIW)

    NIGHTBALL TECHNOLOGIES LIMITED

    Pre-integrated secure environment, encompassing Cyber Resilient Desktop as a Service.

  • Observatory

    BLANKBOX TECHNOLOGIES LTD

    Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.

  • Barracuda Email Protection Premium Plus

    QUADRIS LIMITED

    Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft-365. The solution delivers best in class email security and filtering against spam, zero-day malware as well as more sophisticated phishing attacks while also giving ability to protect data from accidental deletion and compliance via email-archiving

  • Laravel php development

    SPINDOGS LTD

    Open source Laravel php framework. Spindogs' open source laravel framework provides bespoke templates for content editors. GDPR compliant laravel framework has an easy to use admin interface and flexible content editing features. The framework system is user friendly, and fully customisable.

  • Heimdal Security - Privileged Access Management & Application Control

    NETWORK UTILITIES (SYSTEMS) LIMITED

    Build truly in depth automated defences with the only solution with PAM, zero-trust execution and automatic de-escalation of user rights on threat detection. Move beyond outdated rights management tools and finally put a stop to insider threat. Including application management for whitelisting and blocking of running applications.

  • Mimecast Secure Email Gateway - M3RA (Cyber Resilience Pro Plan)

    INTEGRITY360 LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Netwrix Data Classification

    INTEGRITY360 LIMITED

    Netwrix Data Classification solves your data-related challenges, such as mitigating the risk of data breaches, realizing the full value of your content, increasing employee productivity and passing compliance audits with less effort.

  • Modern Polling

    MODERN DEMOCRACY LIMITED

    Modern Polling is a transformative digital solution that is catapulting polling stations into the 21st century. The cloud-based platform provides a polling station management portal and supports digital registration and voter verification. Designed for purpose, Modern Polling, the only dedicated product in market that delivers both operation and financial efficiencies.

  • Proofpoint DLP Transform Package

    SOFTCAT PLC

    Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.

  • Imperva Application Security

    QUADRIS LIMITED

    Comprehensive application security for organisations serious about securing websites, applications and networks to provide best-in-class availability and protection for your users and reputation. Mitigate security threats with this wide ranging suite of functionality providing deeper protection, automation and containment, including same day blocking of zero-days, to attain world class security.

  • Risk and Compliance Solution

    GET SWARMS LIMITED

    GetSwarms' service protects organizations from risks while ensuring compliance with standards like ISO 9001, ISO 27001, PCI DSS, and GDPR. Featuring advanced analytics, automated monitoring, and customizable frameworks, it detects and mitigates potential threats. GetSwarms also provides proactive risk management and comprehensive compliance support.

  • Prolinx Assured Cloud (PAC), Prolinx Official Sensitive Collaborative Working Environment

    PROLINX LIMITED

    Prolinx Collaborative Working Environment (CWE) is an assured, fully managed service including remote access , M365 and a suite of industry-leading cloud-based productivity and collaboration tools supporting data up-to OS . This includes core Microsoft applications such as MS Outlook, OneDrive, Word, Excel, PowerPoint, OneNote, SharePoint, Teams [Premium] and more.

  • CrowdStrike Falcon for IT

    SOFTCAT PLC

    CrowdStrike Falcon® for IT, a module of the leading AI-native CrowdStrike Falcon® platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action

  • Proofpoint Email Fraud Defence

    BYTES SOFTWARE SERVICES LIMITED

    Proofpoint Email Fraud Defence protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox. bssgc

  • Druva Data Resiliency Cloud - Hybrid Workloads

    SOFTCAT PLC

    Transform Your Data Center Backup with Druva for Hybrid Workloads. Centralize your local and remote data protection, with a single control plane to manage all your backup and disaster recovery needs. Scalable, all-in-one backup, disaster recovery (DR), archival, analytics. Simplify data protection, reduce costs, and improve data visibility.

  • BeyondTrust - Privileged Management

    CYBERIAM HOLDINGS LIMITED

    BeyondTrust Privilege Management stops attacks by removing excessive privileges on Windows, Mac, Unix, Linux and Network Devices. The solution empowers organizations to enforce least privilege by eliminating admin and root access.

  • ActiveH Fully Integrated Housing Management Solution

    MIS ACTIVE MANAGEMENT SYSTEMS LIMITED

    MIS-Active Management Systems provide a fully integrated housing / asset management system, CRM, Asset Management, Mobile, Dashboards, Customer and Contractor portals software solutions to social landlords, property and estate management companies across the UK.

  • Keyfactor EJBCA SaaS

    UNSUNG LIMITED

    Keyfactor EJBCA SaaS provides the full power of EJBCA Enterprise without the need for managing the underlying infrastructure. Keyfactor will manage your PKI infrastructure according to best practices and highest assurance.

  • Sophos Intercept X Advanced

    BYTES SOFTWARE SERVICES LIMITED

    Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security. bssgc

  • Forcepoint Insider Threat (FIT)

    SOFTCAT PLC

    Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 20 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.

  • Netwrix Password Reset

    INTEGRITY360 LIMITED

    Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity

  • Computacenter - ProofPoint Email Fraud Defence

    COMPUTACENTER (UK) LIMITED

    Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.

  • iboss Zero Trust Edge

    BLUEFORT SECURITY LIMITED

    The iboss Zero Trust Edge prevents breaches by making applications, data and services inaccessible to attackers while allowing trusted users to securely and directly connect to protected resources from anywhere. Providing customers with a containerized architecture built for infinite scalability.

  • Computacenter - Proofpoint Essentials

    COMPUTACENTER (UK) LIMITED

    Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defence and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep business communications up and running at all time.

  • Check Point Harmony SaaS

    CHARTERHOUSE VOICE & DATA LIMITED

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.

  • Caveris ICAS (Information & Cyber Assurance Suite) SaaS

    CIRRO LIMITED

    Cirro, with Caveris, offers continuous visibility of your cyber protection measures. Our service enables you to identify existing weaknesses, focus efforts on bolstering defences, reducing risks, and ensuring compliance. With our comprehensive monitoring, you can stay ahead of potential threats and safeguard your organisation's digital assets effectively

  • Forcepoint Data Loss Prevention (DLP)

    Chess CyberSecurity Ltd t/a CyberLab

    Follow your data across networks and devices—both at rest, in motion and in use. Create and enforce policies that provision the access and movement of data to prevent data breaches and help ensure compliance with Forcepoint Data Loss Prevention (DLP).

  • Verdict Cyber Security Analysis Service

    ACTIONABLE LTD

    Verdict Cyber is the latest generation cyber security analysis platform. Verdict is an automated cyber security App Store using analytics including deep learning AI to provide users with the most authoritative cyber security verdict about any file type. Verdict enable experts and beginners to perform file analysis.

  • CheckPoint Harmony Mobile

    BYTES SOFTWARE SERVICES LIMITED

    A Complete threat defence solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience. bssgc