Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1735 results found

1735 results found in Lot 2: Cloud software in the category Security risk management

  • ProofPoint Secure Email Relay

    INTEGRITY360 LIMITED

    Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.

  • Bitdefender GravityZone - Security for Email

    Network Utilities (Systems) Ltd

    Multi-layered, cloud-based email security. GravityZone Email Security protects all email service providers and supports hybrid environments using Exchange on-premise, Microsoft365, Exchange Online, or Gmail.

  • Information Security & Cybersecurity Governance Risk Compliance (GRC) Service

    ICYBERDEFENCE LIMITED

    Information Security and Cybersecurity Governance, Risk & Compliance (GRC) is about identifying and controlling security risks, complying with new rules and regulations whilst maintaining the right to do business, guarding brand reputation, and security of confidentiality, integrity and availaability of data.

  • Anti-Phishing Simulation, Security Awareness Training, Reporting, Remediation & DMARC

    Lloyds Ventures

    Humans are the weakest link in cyber security. HumanFirewall makes them the strongest by training them using automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks. EmailAuth enables Brand-Protection, Anti-Spoofing, Anti-Phishing and Enhances Email Deliverability using SPF, DKIM and DMARC.

  • AI Governance

    TMC3 LIMITED

    OneTrust AI Governance ensures responsible AI deployment in public sector organisations by enhancing transparency and compliance across AI systems. Our platform supports inventory management, risk assessment, and ensures alignment with global AI governance standards, fostering trust and ethical AI use.

  • boxxe Tenable Quarterly PCI Scans

    BOXXE LIMITED

    Take unlimited comprehensive scans of your networks so you can identify/address vulnerabilities and ensure your organisation complies with PCI DSS. PCI Compliance Guidelines are followed, ensuring that vulnerabilities don't exist for more than 90 days on any networks that involve payment card transactions. Add-on to Tenable Vulnerability Management.

  • Automation Anywhere - AARI

    VE3 GLOBAL LTD

    Automation 360 product is used for Robotic Process Automation (RPA). Automation 360 is a single, integrated platform that transcends front office and back office technology siloes to automate business processes across all systems and applications, including both SaaS and legacy apps.

  • IRIS Intelligence Asset Management Software

    IRIS INTELLIGENCE LIMITED

    IRIS Asset Management Software (AMS) provides organizations with an intuitive and easy-to-use platform to effectively manage equipment and inventory. Assets can be tracked from procurement to sunset across categories and business units. IRIS-AMS is fully customisable to fit your organisational needs in managing your assets throughout their life cycles.

  • BlackBerry Unified Endpoint Management, (UEM) - Industry Leading Security

    BlackBerry UK Limited

    Now networks are expanding, and workers are remote, you require the right combination of capabilities to ensure you have insight into the devices used for work. Combining security innovation, management tools, platform stability, deep experience, and enhanced productivity applications, BlackBerry UEM delivers capabilities to support endpoint management and workforce productivity.

  • Rapid7 InsightIDR

    ARMADILLO SEC LTD

    Your cloud SIEM for modern threat detection and response. InsightIDR provides immediate and accurate threat detection and drastically reduces the time to respond to attacks by combining behavioural analytics, threat intelligence, and automation in a scalable, easy to love solution that boasts the fastest deployment times in the industry.

  • Office 365 Advanced Security Management

    VE3 GLOBAL LTD

    VE3's Advanced Security Management offers robust anomaly detection policies, empowering you to swiftly detect potential cybersecurity breaches within your network. Leveraging over 70 distinct indicators such as sign-in failures, administrator activity, and inactive accounts, anomaly detection scans user activities to evaluate associated risks, ensuring proactive threat mitigation.

  • NTT DATA Business Solutions - Natuvion SOPHIA Data Analysis

    NTT DATA Business Solutions (UK) Limited

    Natuvion SOPHIA is a system-oriented analysis platform that is easy to use and can be customized. With a catalogue of over 500 analyses in five different areas, a holistic system scan can be carried out and then evaluated.

  • Dapian Data Protection Impact Assessments (DPIAs)

    COALESCENT LIMITED

    Dapian has been designed by public sector organisations and national bodies, to empower non-experts in the wider business to take responsibility for their data protection processes. Organisations can screen, complete, signoff, store, share and collaborate on Data Protection Impact Assessments, Data Ethics Assessments & Equality Impact Assessments.

  • Computacenter - CrowdStrike Application Security Posture Management

    Computacenter (UK) Ltd

    CrowdStrike's Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • GRC, Risk, Audit and Compliance Management software

    SYMBIANT LTD

    Symbiant is an agile AI enabled, modular, GRC platform for Risk Management Software, GRC, Audit Management Software, Compliance Software, Risk Management Systems, and audit management systems. It's modular so you can activate and customise the solutions you need. Includes action tracking, KRI, and full reporting.

  • Splunk Software

    APTO SOLUTIONS LIMITED

    Apto provide SaaS products for Splunk to help monitor and analyse machine data. Used in conjunction with data pipelining services such as Cribl and Splunk Edge Processor along with data analytics we deliver improved operational intelligence. We use Splunk and Cloud Accredited Consultants (AWS and Azure) to deliver this service.

  • Computacenter - Varonis SaaS Data Security Platform

    Computacenter (UK) Ltd

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • SecurityScorecard - Attack Surface intelligence, Secure Supply Chain

    SOMERFORD ASSOCIATES LIMITED

    SecurityScorecard’s Attack Surface Intelligence detects more unknown unknowns, including those of your third-party vendors and how they pose a risk to your business, arming you with deep contextual insights and attribution to prioritize your next steps - all in one single platform.

  • Compuatacenter - Proofpoint Threat Protection Suite

    Computacenter (UK) Ltd

    Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.

  • CyberArk Endpoint Privilege Manager (EPM) SaaS

    CYBERIAM HOLDINGS LIMITED

    CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.

  • Netwrix Password Reset

    BYTES SOFTWARE SERVICES LIMITED

    Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity. bssgc

  • Netwrix Password Policy Enforcer

    INTEGRITY360 LIMITED

    Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware.

  • Risk Radar - Risk Management

    ILLUMINET SOLUTIONS LIMITED

    Risk Radar is a highly effective Risk Identification and management solution, which supports Illuminet's rapid Risk Management methodology. The solution provides a rich analytical view of your risk posture and the methodology allows you to reduce your exposure rapidly.

  • Netwrix Password Policy Enforcer

    BYTES SOFTWARE SERVICES LIMITED

    Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware. bssgc

  • Cyber Resilient Integrated Workspace (CRIW)

    NIGHTBALL TECHNOLOGIES LIMITED

    Pre-integrated secure environment, encompassing Cyber Resilient Desktop as a Service.

  • Jigsaw24 - Jamf Software Solutions for Apple

    Jigsaw24

    Jamf Apple device management and associated professional services. Building Unified Endpoint Management solutions for Apple ecosystems. Jamf Pro manages macOS, iOS and tvOS devices, and with the introduction of Jamf Connect and Jamf Protect, Jamf for Business delivers an enterprise platform, with capabilities in authentication, management and endpoint protection.

  • Observatory

    BLANKBOX TECHNOLOGIES LTD

    Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.

  • SentinelOne Endpoint Protection

    SAPPHIRE TECHNOLOGIES LIMITED

    SentinelOne unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial intelligence. With SentinelOne, organisations can detect malicious behaviour across multiple vectors, rapidly eliminate threats with a fully automated integrated response and adapt their defences against the most advanced cyber attacks.

  • Precisely Ironstream

    PRECISELY SOFTWARE LIMITED

    Integrate IBM mainframe and iSeries systems into leading IT analytics and operations platforms for an enterprise-wide view. Deliver insightful log data, events and intelligence from IBM mainframe and iSeries environments and makes them work seamlessly with Splunk, ServiceNow, Micro Focus, Elastic, Kafka, Microsoft SCOM and more.

  • Becrypt Everything 365 - Assured

    BECRYPT LIMITED

    Becrypt's Everything 365 service is designed businesses who are looking to get all of their IT under control. Aimed at Public Sector departments and organisations, and commercial companies that support public sector, who need a fast, easy deployable and assured solution that meets the required HMG security standards.