Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1698 results found

1698 results found in Lot 2: Cloud software in the category Security risk management

  • Trustmarque Palo Alto Prisma Access

    TRUSTMARQUE SOLUTIONS LIMITED

    Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.

  • CheckPoint Harmony Mobile

    SOFTCAT PLC

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • CDW Proofpoint Security Awareness Training

    CDW LIMITED

    Proofpoint Security Awareness Training helps you deliver the right training to the right people at the right time. It turns your end users into a strong last line of defense in identifying cyber attacks and protecting your organization.

  • Klaxon Major Incident and Mass Notification Platform

    KLAXON TECHNOLOGIES LIMITED

    Klaxon is a major incident, mass notification and planned maintenance communications solution, helping organisations keep people safe, informed and productive during an incident, emergency or crisis. It is ideally suited for SME and Enterprise organisations and supports multiple use-cases such as IT downtime, Business Continuity, Disaster Recovery and Cyber-security communications.

  • Mataco Business Continuity Software

    SAVANT LIMITED

    Mataco is a secure, cloud-based service offering standards based compliant business continuity plan for implementation, management, exercise, review and audit. Mataco also supports incident management activation and activity tracking. Mobile Mataco ensures that Plans can be accessed from anywhere at any time from a mobile device.

  • Tenable Vulnerability Management Licences

    MONDAS CONSULTING LTD

    Purchase Tenable vulnerability management licences to utilise the Tenable Vulnerability management tool to prioritise and fix vulnerabilities within your cloud and on-prem environments. Tenable will scan your internal and external network to uncover hidden vulnerabilities.

  • CDW Proofpoint Insider Threat Management

    CDW LIMITED

    Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly. And we correlate user activity and data movement to protect you from insider-led data breaches.

  • iVano 365

    TRANSCRIBE UK LTD.

    iVano 365 is a cloud based Workflow Management Software solution for digital dictation. Dictate on the go with iVano Dictate, this smartphone app enables busy professionals to dictate and upload directly to iVano 365. (Available for Apple and Android devices.) The solution is hosted on Microsoft Azure Cloud Platform.

  • Tenable One - Standard

    PHOENIX SOFTWARE LIMITED

    Tenable One provides visibility across your attack surface, focus efforts to prevent attacks and accurately communicate cyber risk to support optimal business performance. Tenable One Standard is comprised of: Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory

  • Email Verification

    MELISSA DATA LTD.

    Melissa’s email verification service can flag up to 95% of bad email addresses to increase deliverability, avoid high bounce rates and blacklisting, and protect your valuable sender reputation. Ping each email box in real time to validate, improve deliverability and reduce fraud. Mailbox validation and domain correction.

  • Trustmarque Palo Alto Cortex XSOAR

    TRUSTMARQUE SOLUTIONS LIMITED

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • Micro Focus, now OpenText - Operations Bridge (OpsBridge) on SaaS

    MICRO FOCUS SOFTWARE UK LTD

    Micro Focus® Operations Bridge (OpsBridge) monitors your IT environment and consolidates data from existing tools. Operations Bridge applies automated discovery, monitoring, analytics, and remediation to data across traditional, private, public, and multi-cloud and container-based infrastructure. It displays business and IT KPIs for executive stakeholders and operations staff, providing real-time insight.

  • Juniper Websites

    JUNIPER EDUCATION SERVICES LIMITED

    Boasting four decades of expertise, specialising in tailored websites to suit any budget, offering comprehensive design, development, and construction services. Our goal is to elevate your online visibility, facilitating recruitment and engaging diverse audiences. Let us transform your digital footprint, empowering you to thrive in the dynamic landscape of education.

  • SentinelOne Managed Endpoint Detection & Response (MDR)

    EXPONENTIAL-E LIMITED

    SentinelOne Endpoint Detection & Response (EDR) makes it simple to secure your Windows, Mac and Linux. SentinelOne EDR will employs artificial intelligence and machine learning to detect, prevent, and respond to cyber threats faced by your organisation.

  • Proofpoint Essentials

    BYTES SOFTWARE SERVICES LIMITED

    Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defence and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep business communications up and running at all time. bssgc

  • CheckPoint Harmony SASE

    BYTES SOFTWARE SERVICES LIMITED

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats. bssgc

  • Proofpoint Identity Threat Defense & Response (ITDR)

    INTEGRITY360 LIMITED

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Imprivata Vendor and Privileged Access Management

    SOMERFORD ASSOCIATES LIMITED

    Imprivata Privileged Access Management addresses critical security and compliance challenges by protecting privileged administrator access to an organization’s most sensitive IT systems and digital assets. Enterprise credential vaulting and session management of privileged users and Enterprise remote access to control and secure inbound 3rd party access to critical systems data

  • BeyondTrust Privileged Management

    INTEGRITY360 LIMITED

    BeyondTrust Privilege Management stops attacks by removing excessive privileges on Windows, Mac, Unix, Linux and Network Devices. The solution empowers organizations to enforce least privilege by eliminating admin and root access.

  • Snowflake

    INTERWORKS EUROPE LIMITED

    Integrated data sharing platform with near infinite scalability. data lakes, enterprise data warehouse, data marts, big data storage and analytics. Secure data sharing. Interfaces with leading ETL, ELT visualisation and machine learning tools. Automatic load based scaling. Upgrades, patches, backups, load-balancing, maintenance and tuning are all handled automatically. NHS expertise,

  • BMC Helix Discovery

    Fusion Business Solutions (UK) Limited

    BMC Helix Discovery is a cloud-native discovery and dependency mapping solution for visibility into hardware, software and service dependencies across multi-cloud environments - ROI 314%, 95% improvement in IT asset security. Fusion GBS is a Platinum Partner of BMC, reselling BMC Helix Discovery.

  • AvePoint EnPower for Microsoft 365

    PHOENIX SOFTWARE LIMITED

    As appetites continue to grow for more ways to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft 365, forcing IT to re-evaluate how they support the organization now and in the future.

  • Intelligent Automation - RPA, Intake, BPM, Machine Learning , NLP, Analytics & Visualization

    VE3 GLOBAL LTD

    VE3's Digital Workforce integrates intelligent automation solutions to elevate your business processes. We employ a domain-centric and tool-based strategy to prioritize end-to-end automation. Our proprietary catalysts accelerate your path to a digital future and elevate the digital intelligence of your operations.

  • NHS Secure Data Environment (SCHOLAR)

    PRESCRIBING SERVICES LTD

    Eclipse SCHOLAR (Secure Clinical Hub for Online Learning Audit & Research) empowers NHS ICBs to effortlessly implement a secure pseudonymised data environment for regional activities with full data specialist support. The system allows ICBs to work collaboratively on research programmes with 28 million live patient portals already integrated.

  • Logit.io Application Performance Monitoring and Observability

    LOGIT.IO LTD

    The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • Tenable Vulnerability Assessment Scanning and Management as a Service

    PLANNED LINK LTD

    A cloud-based vulnerability management solution

  • Netskope - Web and Cloud Security

    INTEGRITY360 LIMITED

    Cloud security platform designed to protect data and ensure security across cloud services and applications including Microsoft O365 or Zoom. It offers a range of features including real-time data and threat protection, data loss prevention (DLP), cloud access security broker (CASB) capabilities, and secure web gateway (SWG) functionality

  • Luciditi Identity Verification (Right to Work, Right to Rent DBS Checks)

    ARISSIAN LTD

    The Luciditi digital identity services allows secure MUTUAL digital verification & authentication of individuals and third parties. Available through a mobile app or an embedded service utilising technology with automated liveness detection and document authenticity checks, to streamline on boarding processes or authenticate communications between parties.

  • Qualys Cloud Platform (QCP)

    SOFTCAT PLC

    Qualys Cloud Platform consists of a suite of IT security and compliance solutions delivered via SaaS deployment model that leverages shared and extensible core services. The solution allows customers to continuously monitor their hybrid environments for Vulnerabilities, compliance, misconfigurations, automate remediation with the aim of reducing organisational risk.

  • IBM Security - Trusteer Pinpoint

    IBM UNITED KINGDOM LIMITED

    IBM Trusteer helps organizations establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and patented machine learning, Trusteer provides a holistic approach to identifying customers, without negatively impacting user experience. Trusteer runs over 40 billion application accesses monthly and over 1 billion monthly user sessions.