Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1553 results found

1553 results found in Lot 2: Cloud software in the category Secure content and threat management

  • CDW Sophos Intercept X Mobile

    CDW Limited

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • Proofpoint Core - P1 Bundle

    INTEGRITY360 LIMITED

    Train end-users against threats. Augment threat-protection with a robust security-awareness training-programme integrated with email-security controls and phishing-simulations, cultural/knowledge assessments, comprehensive training/awareness. Tailored curriculum delivered to users based on actual threats. Full-catalogue of interactive training/tools designed to change end-user behaviour. Capabilities:threat simulations testing user response to phishing-attacks, 40+languages, 13 categories.

  • Sophos Central Email Advanced

    INTEGRITY360 LIMITED

    Sophos Email is a cloud-based secure email gateway solution for Sophos Central. Built to integrate seamlessly with popular email platforms, Sophos Email is engineered to keep businesses safe from email threats by simply stopping spam, phishing, malware, and data loss.

  • CDW Check Point CloudGuard Web Application Firewall (WAF)

    CDW Limited

    Check Point CloudGuard WAF provides Web Application and API protection. With deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security.

  • Sophos Managed Detection and Response Essentials (MDR) Server

    Phoenix Software Ltd

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • AvePoint Opus

    Softcat Limited

    "Comprehensive solution for Information Lifecycle Management allowing you to have complete control from creation to archive or defensible disposal, all through a central interface. Discover and understand your data, remove redundancy, optimize storage, automate lifecycle, ensure compliance, and classify content intelligently with advanced machine learning for efficiency."

  • MTI Forcepoint ONE

    MTI Technology Ltd

    Forcepoint ONE combines Zero Trust and SASE security technologies, including three secure access gateways and a variety of shared threat protection and data security services, all built on a cloud-native platform. This allows the public sector to adapt quickly to hybrid-working while keeping attackers out and sensitive data in.

  • Computacenter - Infoblox BloxOne Threat Défense

    Computacenter (UK) Ltd

    Infoblox BloxOne Threat Defense Advanced, a comprehensive DNS Detection and Response (DNSDR) solution, detects threats and stops attacks by hunted/pre-campaign/DNS threat intelligence. Intelligent ecosystem integration/automation/AI-driven analytics to reduce MTTR, improve ROI of security tools, and SecOps efficiency. Lookalike Domain Monitoring/Takedown services enable businesses to efficiently protect their brand and customers.

  • Computacenter - CrowdStrike Falcon Insight Extended Detection & Response (XDR)

    Computacenter (UK) Ltd

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Track Record Engage

    Jacobs U.K. Limited

    Jacobs’ stakeholder and land management tool provides a digitised, single source of truth to manage engagement and relationships and demonstrate compliance with statutory planning requirements. Gain greater analysis and insight into stakeholder, sentiment and trends. The result, an agile stakeholder management process delivered at lower cost with a better experience.

  • Bitdefender Gravityzone - Next-Gen Endpoint Antivirus

    Network Utilities (Systems) Ltd

    Bitdefender GravityZone Enterprise is a cybersecurity solution for organisations, offering advanced threat protection and endpoint security for devices like servers, desktops, and mobile devices. It combines anti-malware, anti-ransomware, and Endpoint Detection and Response (EDR) capabilities to defend against various cyber threats.

  • CDW Sophos Mobile (CMA)

    CDW Limited

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • SharePoint Intranet Development and Enterprise (Data, Content & Document) Management Services

    Ve3 Global Ltd

    We specialize in creating Intranet, Data, Content, and Document Management solutions utilizing both standard and customized functionalities of SharePoint 2013, SharePoint 2016, SharePoint 2019, and Online/O365 editions. Our Intranet solutions offer centralized communication and collaboration services, encompassing a comprehensive range of modern and classic SharePoint features.

  • AI Anomaly Cyber Security and Monitoring Behavioural Analytics

    adappt

    Defend against insider threat and cyber theft. Uses Deep Learning insights for business transformation. Improve your employee efficiency and increase your bottom line. Complex activity based Neural Networks are capable of rooting out unusual/intrusive behaviour.

  • Ethical Phishing Campaign

    Visionist

    Targeted ethical phishing campaign tailored to your requirements to improve organisational resilience against phishing attacks. Cloud-based service proven to be highly effective at combatting email-borne cyber threats. Comprehensive reporting will demonstrate your improved cyber security awareness. Delivers a high return on investment (ROI) from the targeted campaign.

  • Amazon WorkMail

    Softcat Limited

    Amazon WorkMail is a secure, managed business email and calendar service with support for existing desktop and mobile email client applications. Amazon WorkMail gives users the ability to seamlessly access their email, contacts, and calendars using the client application of their choice.

  • iboss Zero Trust Edge

    Bright Cyber (Voodoo technology LTD)

    The iboss Zero Trust platform utilises a containerised cloud architecture to enable easy migration from legacy appliances, whilst maintaining 100% dedicated IP address space in the cloud. This allows for PDNS intergration, and admin created GDPR Zones with dedicated UK datacentres. Packages include Filtering, Malware detection and Data Loss Prevention

  • Barracuda Email Protection

    Central Networks and Technologies Ltd

    Barracuda Email Protection provides the most comprehensive protection against all 13 email threat types, from spam and ransomware to socially engineered threats such as spear phishing, business email compromise, and account takeover.

  • CDW Check Point CloudGuard Network Security - For Azure Virtual WAN (CGNS vWAN)

    CDW Limited

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.

  • Forcepoint Cloud Access Security Broker (CASB)

    Sapphire

    Forcepoint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and. Information assurance restrictions on using the Cloud.

  • Konsolute ISO Certified Quality Management System (QMS)

    KONSOLUTE

    Implement a robust ISO Certified Quality Management System (QMS) with our solution tailored for Microsoft 365. Manage, track, and audit your organisation's compliance and standards efficiently, enhancing quality management practices across your business operations.

  • Akamai Trafficpeak

    Softcat Limited

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • MTI Delinea Secret Server Cloud Privilege Access Management & Privilege Manager

    MTI Technology Ltd

    Delinea Secret Server Cloud is an online password manager hosted in Azure, a highly secure and available platform. Secret Server has layers of built-in security with easy access management for IT admins, robust segregation of role based duties, AES 256 bit encryption, 60+ out-of-the box reports to demonstrate compliance.

  • Barracuda SecureEdge (SASE)

    PRIMESYS LTD

    Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, anytime, anywhere, providing security inspection and policy enforcement in the cloud, at branch, or on device. Barracuda SecureEdge delivers enterprise-grade security including Zero Trust Network Access (ZTNA), Firewall-as-a-Service, web security, fully-integrated office connectivity with Secure SD-WAN.

  • CyberCyte EAR

    Grove Information Systems

    CyberCyte EAR is a Blue Team Platform for discovering and responding to threats and risks more accurately by creating a consolidated analysis framework integrating asset, threat, hardening baseline, and vulnerability information.

  • Wiz

    Softcat Limited

    Wiz is a CNAPP security platform that helps customers protect everything they build and run in the cloud, providing full-stack agentless cross-cloud support for AWS, Azure, GCP, OCI and Kubernetes. Providing Wiz Code, Wiz Sensor and Wiz Premium Support

  • Evolve Security Automation

    2T Security Ltd

    Evolve delivers on-demand specialist security capabilities that augment your teams, build security capabilities into your business, and maximize security budgets delivering greater coverage and improved security posture of your business. This removes the need to hire additional employees, enabling your existing team to focus their time on strategic security activities.

  • Netwrix Recover for Active Directory

    INTEGRITY360 LIMITED

    Netwrix Recovery for ActiveDirectory helps organizations avoid security breaches and business disruptions by enabling administrators to quickly revert entire AD objects or just a single attribute to a known good state, without downtime. This comprehensive solution handles AD objects, attributes, group memberships, DNS entries, Group Policy objects (GPOs), and more

  • Barrier Networks Secure Data Workflow (OPSWAT MetaDefender)

    Barrier Networks

    MetaDefender is used by organizations that require the highest level of security, including critical infrastructure, government agencies, and financial institutions, to enable a secure way to get files in and out of an organization, and prevent cyber security threats.

  • CDW Check Point Harmony SASE

    CDW Limited

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.