Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2492 results found

2492 results found in Lot 2: Cloud software in the category Security

  • CrowdStrike Falcon XDR

    BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Cloud Testing Services for Healthcare / NHS - On Site

    I-NET SOFTWARE SOLUTIONS LTD

    testing services includes mobile testing,REST,SOAP,UI,Data,System testing,I Automation testing, User acceptance testing, performance testing.Central Government departments and their agencies, Healthcare,Local Government,Defence,Education,Transport ,Criminal Justice.A Quality Assurance and Test Consultancy service that can respond to client needs for testing support as part of an overall solution providing individual on-site testing professionals and teams.

  • RedSift OnDMARC- Next-Gen DMARC-as-a-service

    Gradian Systems Ltd

    With no means to authoritatively identify the sender, anyone can easily impersonate sending domains. OnDMARC is a fully automated, anti-phishing platform that governs DMARC, DKIM, Unlimited SPF & BIMI. Only full automation provides a guaranteed path to rapid and critically, safe enforcement of DMARC.

  • WatchGuard MDR (Managed, Detection and Response)

    Redinet Ltd

    WatchGuard MDR provides 24/7/365 cybersecurity services through the MSP partners to their customers, offering endpoint and Microsoft 365 activity monitoring, threat hunting, and attack detection, investigation, and containment, with guided recommendations for remediation. The offering is managed by an elite team of cybersecurity experts and powered by AI.

  • Mimecast Secure Email Gateway

    KHIPU NETWORKS LIMITED

    Mimecast Secure Email Gateway services portfolio helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organisation.

  • Accredited Virtual Desktop (VDI)

    LOGIQ CONSULTING LTD

    The Accredited Virtual Desktop/Cloud PC is built on Logiq's Turn Key DISX platform, which enables access to an accredited desktop, from an existing device. This reduces the needed for multiple devices whilst enabling collaboration between MOD, other Government Departments and Defence Industry at the OFFICIAL tier.

  • Rapid7 Insight ThreatCommand

    BYTES SOFTWARE SERVICES LIMITED

    Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you make informed decisions and rapidly respond to protect your business. bssgc

  • Microsoft Enterprise Mobility + Security (EMS)

    VE3 GLOBAL LTD

    Enterprise Mobility + Security (EMS) is a mobility management and security platform that helps protect and secure your organization and empower your employees.

  • Netography - Network Detection and Response and M-NDR

    Grove Information Systems

    Netography's Security Platform is the only SaaS solution that provides automatic remediation and cross-network visibility to defend against a broad set of security threats in real-time. With automated threat prevention, organisations can reduce their overall mean time to detect and mean time to resolve.

  • Forcepoint Remote Browser Isolation (RBI)

    Cyberlab

    Forcepoint Remote Browser Isolation (RBI) provides secure and more open access to web content through an isolated browser hosted in the cloud, preventing threats from reaching customers network.

  • One Payment Cloud - Contact Centre Payment Processing

    CIPTEX LTD

    One Payment Cloud is a suite of card payment solutions for both voice and digital interactions which prevent card data from entering a client’s environment (including home workers). This removes the risk of card data breach and greatly reduces the cost of attaining and maintaining PCI compliance.

  • Cisco Full Stack Observability

    SOFTCAT PLC

    Full-Stack Observability by Cisco moves beyond domain monitoring into full-stack visibility, insights, and actions, transforming siloed data into actionable insights that provide shared context for your IT teams, giving you the power to prioritise your actions so you can deliver flawless customer experiences that drive revenue while accelerating digital transformation.

  • Cisco ThousandEyes

    SOFTCAT PLC

    see all the networks and services that make up user experience in a single view, from synthetic transactions and service availability to network paths and global Internet routing feeds. cross-correlation algorithms and interactive visuals makes it easy for you to plan service rollouts, isolate problems, take action resolve issues faster.

  • Office 365 Backup - Datto SaaS Protection

    TECHNOLOGY SERVICES GROUP

    Datto SaaS Protection for Office 365 is the leading cloud-to-cloud backup solution offering an all-in-one backup, search, restore and export solutions for Office 365. SaaS Protection ensures that companies can access, control, and most importantly, own the data they entrust to the cloud.

  • Forescout Cloud

    Communication-STEM Ltd

    The solution provides visibility and the cyber risk for any IP/MAC address connected cyber assets. Visualise the risk and compliance posture changes over time. Detect any cyber threats and orchestrate the response.

  • Proofpoint Complete Package

    INTEGRITY360 LIMITED

    Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.

  • IBM Security MaaS360 with Watson

    IBM UNITED KINGDOM LIMITED

    Cognitive UEM is the future of mobile management and security. Managing endpoints plus their users and data is a time-consuming task with conventional mobile device management (MDM) and enterprise mobile management (EMM) solutions. Cognitive unified endpoint management (UEM) approach that consolidates the management of smartphones, tablets, laptops, desktops, wearables &IoT

  • Cyber Security Consultancy Services

    SALUS DIGITAL SECURITY LIMITED

    Gathering independent assurance of cloud service provision and operation against legal, Government, and Industry standards

  • Securiti - unified data access & intelligence, controls & orchestration across hybrid multicloud

    SOMERFORD ASSOCIATES LIMITED

    Securiti AI is an AI-powered platform for data security and compliance. It offers features such as data discovery, classification, and risk assessment to help organizations protect sensitive information. Securiti AI uses advanced machine learning algorithms to detect threats, automate compliance tasks, and ensure data privacy across cloud environments.

  • Computacenter - CyberArk PAM Self-Hosted

    COMPUTACENTER (UK) LIMITED

    CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics.

  • DevSecOps Integration

    LEFKE IT LIMITED

    "At LefkeIT, our AWS Networking Services offer Government Departments robust and scalable networking solutions. We specialize in designing and implementing AWS networking services such as VPC, Direct Connect, and Route 53, ensuring secure communication between resources. "

  • Tenable Cloud Security

    BYTES SOFTWARE SERVICES LIMITED

    ISee what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights. bssgc

  • CDW CrowdStrike Falcon Identity Threat Detection & Protection

    CDW LIMITED

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • Endpoint Detection and Response Solutions

    FuseMail

    VIPRE Endpoint Detection & Response provides comprehensive anti-malware and anti-exploit protection for Windows and Mac endpoints.

  • ThreatMatch - Cyber Threat Intelligence Platform

    SECURITY ALLIANCE LIMITED

    The ThreatMatch Intelligence Portal is an Intelligence and Cyber Threat Intelligence Portal / Platform (TIP), used for both intelligence and intelligence sharing. The Threat Monitoring platform assesses the threat landscape and contains Threat Alerts, Incidents, Scenarios, Threat reporting, Threat assessments and Threat Actor Profiles.

  • Commvault Cloud

    SOFTCAT PLC

    Commvault provide a cyber resilience platform built for the hybrid enterprise. Commvault Cloud delivers true cloud cyber resilience while ensuring the fastest recovery and we protect more workloads than anyone else.

  • SAP HANA Services

    DEFENCE DATASEC LTD

    At Defence DataSec, our SAP HANA Services are designed to empower Government Departments with advanced analytics, real-time insights, and enhanced performance.We specialize in implementing, optimizing, and managing SAP HANA environments,unlocking the full potential of in-memory computing for your organization.Trust us for reliable,high-performance SAP HANA solutions tailored to your specific requirements.

  • Web Development

    I-NET SOFTWARE SOLUTIONS LTD

    We develop web based applications following GDS guidelines , we have dedicated resources in fullstack(angular/react), wordpress. CMS, Mogento, opensource, all our developments comes with complimentary mobile app, quick delivery and provide high security

  • Oracle Security Service

    DEFENCE DATASEC LTD

    "Oracle Security Service is a comprehensive solution that safeguards sensitive data and critical systems from cybersecurity threats. It offers advanced security features, including access controls, encryption, threat detection, and compliance management. This service ensures data protection, regulatory compliance, and business continuity in an increasingly digital and interconnected world.

  • Palo Alto Networks Advanced Threat Protection

    ITogether

    Advanced Threat Prevention is the industry's first IPS to deliver 96% prevention of web-based Cobalt Strike C2 and 48% more detection of evasive and unknown C2 over other leading IPS solutions.