Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1725 results found

1725 results found in Lot 2: Cloud software in the category Security risk management

  • Anti-Phishing Simulation, Security Awareness Training, Reporting, Remediation & DMARC

    Lloyds Ventures

    Humans are the weakest link in cyber security. HumanFirewall makes them the strongest by training them using automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks. EmailAuth enables Brand-Protection, Anti-Spoofing, Anti-Phishing and Enhances Email Deliverability using SPF, DKIM and DMARC.

  • AI Governance

    TMC3 LIMITED

    OneTrust AI Governance ensures responsible AI deployment in public sector organisations by enhancing transparency and compliance across AI systems. Our platform supports inventory management, risk assessment, and ensures alignment with global AI governance standards, fostering trust and ethical AI use.

  • boxxe Tenable Quarterly PCI Scans

    BOXXE LIMITED

    Take unlimited comprehensive scans of your networks so you can identify/address vulnerabilities and ensure your organisation complies with PCI DSS. PCI Compliance Guidelines are followed, ensuring that vulnerabilities don't exist for more than 90 days on any networks that involve payment card transactions. Add-on to Tenable Vulnerability Management.

  • Automation Anywhere - AARI

    VE3 GLOBAL LTD

    Automation 360 product is used for Robotic Process Automation (RPA). Automation 360 is a single, integrated platform that transcends front office and back office technology siloes to automate business processes across all systems and applications, including both SaaS and legacy apps.

  • IRIS Intelligence Asset Management Software

    IRIS INTELLIGENCE LIMITED

    IRIS Asset Management Software (AMS) provides organizations with an intuitive and easy-to-use platform to effectively manage equipment and inventory. Assets can be tracked from procurement to sunset across categories and business units. IRIS-AMS is fully customisable to fit your organisational needs in managing your assets throughout their life cycles.

  • BlackBerry Unified Endpoint Management, (UEM) - Industry Leading Security

    BlackBerry UK Limited

    Now networks are expanding, and workers are remote, you require the right combination of capabilities to ensure you have insight into the devices used for work. Combining security innovation, management tools, platform stability, deep experience, and enhanced productivity applications, BlackBerry UEM delivers capabilities to support endpoint management and workforce productivity.

  • Rapid7 InsightIDR

    ARMADILLO SEC LTD

    Your cloud SIEM for modern threat detection and response. InsightIDR provides immediate and accurate threat detection and drastically reduces the time to respond to attacks by combining behavioural analytics, threat intelligence, and automation in a scalable, easy to love solution that boasts the fastest deployment times in the industry.

  • Office 365 Advanced Security Management

    VE3 GLOBAL LTD

    VE3's Advanced Security Management offers robust anomaly detection policies, empowering you to swiftly detect potential cybersecurity breaches within your network. Leveraging over 70 distinct indicators such as sign-in failures, administrator activity, and inactive accounts, anomaly detection scans user activities to evaluate associated risks, ensuring proactive threat mitigation.

  • NTT DATA Business Solutions - Natuvion SOPHIA Data Analysis

    NTT DATA BUSINESS SOLUTIONS LIMITED

    Natuvion SOPHIA is a system-oriented analysis platform that is easy to use and can be customized. With a catalogue of over 500 analyses in five different areas, a holistic system scan can be carried out and then evaluated.

  • Dapian Data Protection Impact Assessments (DPIAs)

    COALESCENT LIMITED

    Dapian has been designed by public sector organisations and national bodies, to empower non-experts in the wider business to take responsibility for their data protection processes. Organisations can screen, complete, signoff, store, share and collaborate on Data Protection Impact Assessments, Data Ethics Assessments & Equality Impact Assessments.

  • Computacenter - CrowdStrike Application Security Posture Management

    COMPUTACENTER (UK) LIMITED

    CrowdStrike's Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • GRC, Risk, Audit and Compliance Management software

    SYMBIANT LTD

    Symbiant is an agile AI enabled, modular, GRC platform for Risk Management Software, GRC, Audit Management Software, Compliance Software, Risk Management Systems, and audit management systems. It's modular so you can activate and customise the solutions you need. Includes action tracking, KRI, and full reporting.

  • Splunk Software

    APTO SOLUTIONS LIMITED

    Apto provide SaaS products for Splunk to help monitor and analyse machine data. Used in conjunction with data pipelining services such as Cribl and Splunk Edge Processor along with data analytics we deliver improved operational intelligence. We use Splunk and Cloud Accredited Consultants (AWS and Azure) to deliver this service.

  • Computacenter - Varonis SaaS Data Security Platform

    COMPUTACENTER (UK) LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • SecurityScorecard - Attack Surface intelligence, Secure Supply Chain

    SOMERFORD ASSOCIATES LIMITED

    SecurityScorecard’s Attack Surface Intelligence detects more unknown unknowns, including those of your third-party vendors and how they pose a risk to your business, arming you with deep contextual insights and attribution to prioritize your next steps - all in one single platform.

  • Compuatacenter - Proofpoint Threat Protection Suite

    COMPUTACENTER (UK) LIMITED

    Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.

  • CyberArk Endpoint Privilege Manager (EPM) SaaS

    CYBERIAM HOLDINGS LIMITED

    CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.

  • Netwrix Password Reset

    BYTES SOFTWARE SERVICES LIMITED

    Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity. bssgc

  • Netwrix Password Policy Enforcer

    INTEGRITY360 LIMITED

    Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware.

  • Risk Radar - Risk Management

    ILLUMINET SOLUTIONS LIMITED

    Risk Radar is a highly effective Risk Identification and management solution, which supports Illuminet's rapid Risk Management methodology. The solution provides a rich analytical view of your risk posture and the methodology allows you to reduce your exposure rapidly.

  • Netwrix Password Policy Enforcer

    BYTES SOFTWARE SERVICES LIMITED

    Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware. bssgc

  • Cyber Resilient Integrated Workspace (CRIW)

    NIGHTBALL TECHNOLOGIES LIMITED

    Pre-integrated secure environment, encompassing Cyber Resilient Desktop as a Service.

  • Observatory

    BLANKBOX TECHNOLOGIES LTD

    Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.

  • SentinelOne Endpoint Protection

    SAPPHIRE TECHNOLOGIES LIMITED

    SentinelOne unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial intelligence. With SentinelOne, organisations can detect malicious behaviour across multiple vectors, rapidly eliminate threats with a fully automated integrated response and adapt their defences against the most advanced cyber attacks.

  • Precisely Ironstream

    PRECISELY SOFTWARE LIMITED

    Integrate IBM mainframe and iSeries systems into leading IT analytics and operations platforms for an enterprise-wide view. Deliver insightful log data, events and intelligence from IBM mainframe and iSeries environments and makes them work seamlessly with Splunk, ServiceNow, Micro Focus, Elastic, Kafka, Microsoft SCOM and more.

  • Becrypt Everything 365 - Assured

    BECRYPT LIMITED

    Becrypt's Everything 365 service is designed businesses who are looking to get all of their IT under control. Aimed at Public Sector departments and organisations, and commercial companies that support public sector, who need a fast, easy deployable and assured solution that meets the required HMG security standards.

  • Heimdal Security - Privileged Access Management & Application Control

    Network Utilities (Systems) Ltd

    Build truly in depth automated defences with the only solution with PAM, zero-trust execution and automatic de-escalation of user rights on threat detection. Move beyond outdated rights management tools and finally put a stop to insider threat. Including application management for whitelisting and blocking of running applications.

  • Mimecast Secure Email Gateway - M3RA (Cyber Resilience Pro Plan)

    INTEGRITY360 LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Consultancy as a Service

    KICK ICT GROUP LIMITED

    An experienced and trusted provider of datacentre services, we made a significant investment to upgrade our datacentre in 2019, delivering a state of the art, fully managed Nutanix hyper converged infrastructure hosting solution for our customers, with all the security and accessibility benefit this brings.

  • Sophos Managed Risk

    Cyberlab

    SophosManaged Risk is a vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. With SophosManaged Risk, experienced analysts identify high-priority cybersecurity vulnerabilities and potential attack vectors in your environment so actions can be taken to prevent attacksbefore business disruption.