Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2492 results found

2492 results found in Lot 2: Cloud software in the category Security

  • Certificate Lifecycle Management - SaaS

    Keyfactor

    Manage digital/TLS certificates in cloud, with CA agnostic Keyfactor Command. Discover all of your certificates, public & private, across your enterprise & achieve single screen visibility & control.

  • Chrome - EduTyping

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions provides Chrome - EduTyping, a comprehensive keyboarding software designed for the educational sector. This cloud-based tool teaches students essential typing skills through a curriculum that includes interactive exercises and games, preparing them for digital literacy in a fun and engaging way.

  • Knowbe4 Cyber Security Awareness Training

    SCG CORPORATE LIMITED

    Your employees are frequently exposed to sophisticated social engineering attacks. It is time for a comprehensive approach to effectively manage this problem, managed by people with a technical background. The world's largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters.

  • Veracode Application Security Testing

    TMC3 LIMITED

    Veracode is an enterprise-class application security solution, which allows DevOps teams to shift-left in their security approach. Veracode provides Static Analysis, Dynamic Analysis, Software Composition Analysis API Scanning solutions. SaaS platform helps automate security feedback and aligns with development technologies, providing the highest accuracy and broadest coverage in the industry.

  • Rapid7 Insight ThreatCommand

    CHESS ICT LIMITED

    Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you to make informed decisions and rapidly respond to protect your business.

  • Enterprise User Management for Microsoft 365, SharePoint and Teams

    BRIGHTWIRE TECHNOLOGY SERVICES LIMITED

    Secure and manage your Office 365 tenant with a consistent and automated user management platform. Ensure compliance with organisational policies on user access, roles and permissions. Manage and optimise user licensing to ensure compliance. Save time and reduce risk of manual error and inappropriate permissions being granted to your users.

  • Ethical Phishing

    AVELLA SECURITY LIMITED

    BLOCKPHISH provides tailored Ethical Phishing campaigns which improve organisational resilience against phishing attacks. The cloud-based solution is proven to be highly effective in combatting email borne cyber threats, and our comprehensive reporting will demonstrate your improved cyber security. A high ROI can be demonstrated from the BLOCKPHISH solution.

  • Hosted Microsoft Teams Recording

    Business Systems (UK) Ltd

    Microsoft Teams recording service from Business Systems is cost effective and easy to use supporting capture of voice and instant messaging from your Teams interactions. The service covers capture, archive, search and replay capabilities from your Teams voice, meeting, and collaboration streams.

  • SAP Customer Data Platform

    SAP (UK) LIMITED

    SAP Customer Data Platform is an enterprise-grade customer data platform that can help you personalise engagements across channels to better connect with customers. By bridging online and offline data, SAP Customer Data Platform can help you understand your customers and deliver relevant, trusted, and personalised engagements.

  • Endpoint & DNS Protection (web filtering)

    ACTISOFT TECHNOLOGY LIMITED

    Managed Endpoint Protection and Web Filtering service providing protection to your organisation against sophisticated cyberattacks. Streamline management with fast deployment and scans. Block threats at the domain level and reduce costs due to infections. Control costs with per device per month charges and only pay for what you use.

  • Sophos Intercept X Advanced

    PHOENIX SOFTWARE LIMITED

    Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.

  • CDW Microsoft Cloud Software Services

    CDW LIMITED

    Microsoft's SaaS services allows users to connect to and use cloud-based applications over the Internet across Modern Work & Security and Dynamics 365 & PowerPlatform service platforms.

  • One Education and Children Services (Capita)

    CAPITA BUSINESS SERVICES LTD

    Our One Education SaaS helps teams work more efficiently, allowing authorities to invest their time and resources improving the lives of children and families. Provides a clear picture of a child or family’s circumstances, giving authorities the information required to intervene early and improve outcomes.

  • Human Cyber-Security Risk Management

    QUADRIS LIMITED

    Total human cyber security risk management your people will love in a single, intuitive and automated cloud service. Drive cyber security awareness. Boost phishing resilience, simplify policy pains and safeguard exposed users. Engage your users through personalised programmes, quickly and efficiently using automation covering the essentials of information security.

  • Managed Microsoft Teams

    Cisilion Limited

    Cisilion's Microsoft Teams Service provides access to our Microsoft Certified Professionals that help you to design, commission and support the deployment of Microsoft Teams Collaboration platform within your environment. Cisilion providing expert advice and recommendations on how to best get the best from your Microsoft Cloud investment.

  • O365 Vulnerability Scanning

    PEGASUS LABS PTY LTD

    Monitor Office 365 configuration against good practice standards and custom policies for secure configuration. Detect and remediate common user mistakes in real time. Ensure compliance with standards by auditing your Office 365 configuration and file sharing for non-compliant security controls.

  • boxxe Sophos Firewall

    BOXXE LIMITED

    Sophos Firewall provides a true next-gen platform to tackle the modern encrypted internet and evolving threat landscape. It identifies hidden risks, protects against threats, and responds to incidents without taking a performance hit. Xstream Architecture utilizes a packet processing architecture that delivers extreme levels of visibility, protection, and performance.

  • Bilingual Umbraco CMS for Welsh / English digital service or website

    S8080 LIMITED

    Umbraco cloud hosted CMS for Welsh / English bilingual digital services and websites. S8080's GDPR compliant Umbraco CMS platform securely handles Welsh language, CRM, integrations, single sign-on, forms and workflow. Umbraco content management system is open-source, easy to use, yet powerful. Mobile, accessible and designed to your bilingual user’s needs.

  • Becrypt Paradox Edge Hosted Management Service

    BECRYPT LIMITED

    Paradox is a secure Cloud Access desktop platform, developed with and widely deployed across UK Government for securely accessing Cloud based services. Paradox provides an intuitive hosted end user platform for accessing Public or Private Cloud resources, supporting identity management and segregation between infrastructure management and business service delivery.

  • Probation Mobile Reporting Application

    UNILINK SOFTWARE LIMITED

    The application supports Probation Services to deliver remote supervision and mobile reporting. It integrates case management and reporting, enabling service users to check-in at agreed locations or offices via mobile device/kiosk. It features bio-authentication, appointment reminders, 2-way messaging, customisable forms, curfew checks, community service info, access to information and documents.

  • Check Point CloudGuard Code Security (Spectral)

    CHARTERHOUSE VOICE & DATA LIMITED

    CloudGuard Code Security, part of CloudGuard CNAPP, provides automated tools that integrate with developers’ tools to detect code vulnerabilities, identify secrets and misconfigurations in the code pre-deployment, preventing unauthorized use. With CloudGuard Code Security, prevent exposing API keys, tokens and credentials, remediate security misconfigurations and ensure security without compromising productivity.

  • Blackdot Videris OSINT Investigations Software accessed via the Long Arm® Platform

    INTERNET INVESTIGATION SOLUTIONS LTD

    Videris OSINT platform enables users to conduct OSINT investigations faster and more accurately and identify hidden connections and risks. Collect, analyse and visualise Open Source Intelligence and combine with internal data. Videris is used by government agencies and law enforcement to transform efficiency and effectiveness in OSINT investigations.

  • Body Worn Video Solutions from Reliance Protect

    Reliance High-Tech Ltd

    Reliance Protect body worn camera solutions enhance incident deterrence and generate powerful evidence with HD video and audio. Included are options around customer live stream viewing and back into our in-house 24/7/365 Alarm Receiving Centre. Cloud storage and full control, editing and sharing recordings via the VideoManager portal.

  • Salesforce Financial Services Cloud Consulting

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions Ltd specializes in Salesforce Financial Services Cloud Consulting, tailored for government financial departments. Our expert consultants collaborate closely with government entities to optimize financial processes, enhance client relationships,and streamline workflows.We configure Salesforce Financial Services Cloud to align with specific governmental financial objectives,ensuring efficient and compliant financial operations.

  • Computacenter - IBM Security - Trusteer Pinpoint

    COMPUTACENTER (UK) LIMITED

    IBM Trusteer helps organizations establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and patented machine learning, Trusteer provides a holistic approach to identifying customers, without negatively impacting user experience. Trusteer runs over 40 billion application accesses monthly and over 1 billion monthly user sessions.

  • Application Development Modernisation and Transformation Service

    I-NET SOFTWARE SOLUTIONS LTD

    INET has been supporting the digital agenda on a Global scale, delivering services locally. We use appropriate methodologies to support and drive changing business needs. With innovative development of cloud applications we continually support and innovate to deliver outstanding solutions in this ever changing, fast paced IT environment.

  • Sophos Managed Detection and Response Essentials (MDR) Server

    CHESS ICT LIMITED

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Sophos Managed Detection and Response Essentials (MDR) Endpoint

    BYTES SOFTWARE SERVICES LIMITED

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications. bssgc

  • Check Point CloudGuard Cloud Security Posture Management (CSPM)

    SOFTCAT PLC

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.

  • External Vulnerability Assessment Service

    LEIDOS INNOVATIONS UK LTD

    Leidos provides external vulnerability management as a service, using both the latest technologies and our team of experienced cyber analysts. They deliver assurance that your external infrastructure (web facing) is secured and any vulnerabilities are identified in the shortest possible time, reducing attack surface and mitigating risk of compromise.