Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1725 results found

1725 results found in Lot 2: Cloud software in the category Security risk management

  • Grant Thornton - Cloud Security Assessment

    GRANT THORNTON UK LLP

    Security assessments for a range of cloud environments such as Amazon Web Services (AWS), Microsoft Azure and Google Cloud to review the design, processes and implementation of your controls and perform technical validation to provide a view on any vulnerabilities and risks. .

  • Microsoft 365 F5 Security and Compliance add-on

    VE3 GLOBAL LTD

    Microsoft 365 F5 is a complete, intelligent solution that extends many of the E5 features of Office 365, Windows 10 Enterprise, and Enterprise Mobility + Security to frontline workers. It empowers frontline Workers to be creative and work together, securely.

  • Palo Alto Prisma Cloud

    PHOENIX SOFTWARE LIMITED

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.

  • Interneuron RPA - Intelligent Automation

    Interneuron Ltd

    Interneuron's robotic process automation technology (RPA) provides a reliable platform for automating any manual tasks your team may carry out. From user management, record duplication, email processing or pre-population of systems, our RPA solution can do it.

  • Check Point CloudGuard Cloud Security Posture Management (CSPM)

    LRQA

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.

  • NTT DATA Business Solutions - Natuvion TDA Test Data Anonymisation

    NTT DATA BUSINESS SOLUTIONS LIMITED

    Natuvion TDA "Test Data Anonymisation" is a flexible and generic solution for intelligent, rule-based and consistent anonymisation / pseudonymisation of data in SAP systems and SAP landscapes. The "Test Data Anonymisation" (TDA) solution covers the known challenges of depersonalisation / anonymisation / pseudonymisation.

  • Forecpoint / Everfox Data Diodes

    SOFTCAT PLC

    Designed for highly secure environments, Data Diodes implement key stages to UK National Cyber Security Centre’s (NCSC) design patterns for Safely Importing / Exporting Data. Enables rapid, uni-directional, automated transfer – via 1Gb or 10Gb fibre link- of highly complex data segmenting and protecting networks, devices, and other digital assets.

  • Delinea Secret Server Cloud Privilege Access Management

    PROOFID LIMITED

    Delinea Secret Server Cloud is an online password manager hosted in Azure, a highly secure and available platform. Secret Server has layers of built-in security with easy access management for IT admins, robust segregation of role based duties, AES 256 bit encryption, out of the box reports to demonstrate compliance.

  • CrowdStrike Falcon Identity Threat Detection & Protection

    INTEGRITY360 LIMITED

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • Netwrix Stealth Intercept

    INTEGRITY360 LIMITED

    Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.

  • CDW CrowdStrike Falcon® Counter Adversary Operations

    CDW LIMITED

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.

  • UK Sovereign Digital Sensitivity Review Service - SVGC

    NINE23 LTD

    UK Sovereign managed service for hosted Digital Sensitivity Review (DSR) Toolset processes digital files to ensure sensitive content is redacted. DSR toolset with bespoke development and AI logic to pre-identify sensitivities and indicate redaction suggestions for rapid Curator review, automatically packaging files with metadata for transfer to archive or consumer.

  • CDW AvePoint Cloud Backup Azure

    CDW LIMITED

    Immutable, Air-Gapped Cloud to Cloud Backups for Microsoft 365, Dynamics 365, Microsoft Azure, Salesforce and Google Workspace

  • CyberArk Workforce Identity

    SOFTCAT PLC

    CyberArk workforce Identity is an IDaaS that offers full featured identity lifecycle & access management; it includes adaptive MFA/SSO and unique extra controls such as a Password Manager, adaptive Workstation MFA, Secure Browser and Web session protection

  • Imprivata Enterprise Access Management - EAM (formally OneSign Single Sign On and confirm ID)

    SOMERFORD ASSOCIATES LIMITED

    Imprivata Enterprise Access Management® provides secure, No Click and password less and multi factor authentication (MFA) for remote access, connected devices, workstations, virtual desktops, critical applications, Electronic Health Records (EHRs), and other systems containing patient data.

  • Tenable Web Application Scanning

    PLANNED LINK LTD

    A cloud-based vulnerability management solution

  • Micro Focus, now OpenText - ValueEdge on SaaS

    MICRO FOCUS SOFTWARE UK LTD

    ValueEdge delivers end-to-end value stream management by providing a modular, cloud-based platform that powers the entire software product lifecycle, from strategy to delivery. This AI-powered platform works with existing commercial and open-source software development tools. With ValueEdge, you can improve production efficiency, mitigate risks and maximize ROI across your organization.

  • Check Point Cloudguard Code Security

    ITogether

    CloudGuard Code Security provides automated tools that integrate with developers’ tools to detect code vulnerabilities and identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends. With CloudGuard Code Security, organizations can prevent exposing API keys, tokens and credentials, remediating security misconfigurations.

  • IT infrastructure Protection and Monitoring System - ESET Based. Anti-Virus/Malware/Ransomware/Spam.

    BRADLEYSOFT

    ESET PROTECT Platform. Available in 5 Tiers. Advanced Multilayered Protection, Including Antivirus, Anti-Malware/Ransomware, Spam Filtering, Comprehensive Cloud Infrastructure Protection. Secure computers, mobiles, file servers, cloud endpoints. Full disk encryption capabilities on Windows and macOS. Advanced protection for Microsoft 365 & Google Workspace apps. Protects your Cloud Email. Patch Management.

  • Check Point Harmony Email & Collaboration

    CHARTERHOUSE VOICE & DATA LIMITED

    Provides organizations with complete full-suite protection providing security admins with an easy-to-deploy and manage platform, block sophisticated social engineering attacks such as impersonation, zero-day phishing and Business Email Compromise. Using AI-trained engines. Securing inbound, outbound, and internal emails from phishing attacks inspects the communication’s metadata, attachments, links and language

  • Wiz SaaS

    THE SERVER LABS LTD

    The Wiz Cloud Security Platform, helps development teams to build faster in the cloud by enabling security, dev and devsecops to work together in a self-service model built for the scale and speed of your cloud development Wiz is a single, comprehensive Single Platform for Everything Cloud Security

  • Veracode Security Labs

    TMC3 LIMITED

    Veracode Security Labs shifts AppSec knowledge left, giving developers hands-on training to confidently tackle modern threats by exploiting and patching real code, and applying DevSecOps principles to deliver secure code on-time. Regular assignments, progress reports, and leaderboard foster healthy competition, and encourage developers to continuously improve their secure coding skills.

  • Computacenter - Splunk Threat Detection Investigation and Response Suite

    COMPUTACENTER (UK) LIMITED

    Use any or all of Splunk’s Security products and services together to provide a unified security operations solution. On top of Splunk Enterprise or Splunk Cloud, combine Enterprise Security (SIEM), Mission Control, Splunk Attack Analyser (SAA), Splunk Threat Intelligence Management (TIM), Splunk SOAR, and Splunk UBA.

  • Open Banking Account Information Service (Mobile Connected)

    DGM AGILITY LIMITED

    DGM Agility is an authorised Account Information Service Provider (AISP) which enables us to provide a gateway to the Open Banking service. This service enables access to an aggregation of financial information for an individual or business. We collect, store, and make available the information as a service

  • Secris - automated vulnerability scanner

    MADE PURPLE LTD

    Secris is a comprehensive Cyber Security tool that automatically finds risks and vulnerabilities in your systems and infrastructure. Our Automated Vulnerability scanner monitors and secures your external endpoints, catalogue system inventory and software and automatically check them against current CVE's and emerging threats from a range of sources.

  • Forescout - EyeSight / EyeControl / EyeInspect

    Barrier Networks

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assests.

  • Amazon WorkSpaces

    SOFTCAT PLC

    Amazon WorkSpaces offers you an easy way to provide a secure, managed, cloud-based virtual desktop experience to your end-users. Amazon WorkSpaces provides a fully managed service. With Amazon WorkSpaces, you can deliver a high-quality portable desktop, and applications, to your users on the device of their choice.

  • Check Point Harmony SaaS

    LRQA

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.

  • Heimdal Security - Unified Threat Platform

    Network Utilities (Systems) Ltd

    One Platform, One Agent, Complete Protection From ransomware and insider threat, to business compromise and anything in between, Heimdal™ protects your operational integrity by stopping even the most sophisticated cyberattacks from day one. Bundle includes: Threat Prevention, Patch & Asset Management Next-Gen Antivirus & MDM

  • altSRD - Secure Remote Desktop

    ALTIATECH LTD

    altSRD provides right-sized virtualized desktop solutions that balances security, productivity and value - Parallels RAS (remote application server): a flexible virtual application and desktop delivery solution. Parallels Secure Workspace (formerly Awingu): a highly secure and auditable access to your desktops, company files as well as legacy, web, and SaaS apps.