Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1698 results found

1698 results found in Lot 2: Cloud software in the category Security risk management

  • UK Sovereign Digital Sensitivity Review Service - SVGC

    NINE23 LTD

    UK Sovereign managed service for hosted Digital Sensitivity Review (DSR) Toolset processes digital files to ensure sensitive content is redacted. DSR toolset with bespoke development and AI logic to pre-identify sensitivities and indicate redaction suggestions for rapid Curator review, automatically packaging files with metadata for transfer to archive or consumer.

  • CDW AvePoint Cloud Backup Azure

    CDW LIMITED

    Immutable, Air-Gapped Cloud to Cloud Backups for Microsoft 365, Dynamics 365, Microsoft Azure, Salesforce and Google Workspace

  • CyberArk Workforce Identity

    SOFTCAT PLC

    CyberArk workforce Identity is an IDaaS that offers full featured identity lifecycle & access management; it includes adaptive MFA/SSO and unique extra controls such as a Password Manager, adaptive Workstation MFA, Secure Browser and Web session protection

  • Imprivata Enterprise Access Management - EAM (formally OneSign Single Sign On and confirm ID)

    SOMERFORD ASSOCIATES LIMITED

    Imprivata Enterprise Access Management® provides secure, No Click and password less and multi factor authentication (MFA) for remote access, connected devices, workstations, virtual desktops, critical applications, Electronic Health Records (EHRs), and other systems containing patient data.

  • Tenable Web Application Scanning

    PLANNED LINK LTD

    A cloud-based vulnerability management solution

  • Micro Focus, now OpenText - ValueEdge on SaaS

    MICRO FOCUS SOFTWARE UK LTD

    ValueEdge delivers end-to-end value stream management by providing a modular, cloud-based platform that powers the entire software product lifecycle, from strategy to delivery. This AI-powered platform works with existing commercial and open-source software development tools. With ValueEdge, you can improve production efficiency, mitigate risks and maximize ROI across your organization.

  • Check Point Cloudguard Code Security

    ITogether

    CloudGuard Code Security provides automated tools that integrate with developers’ tools to detect code vulnerabilities and identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends. With CloudGuard Code Security, organizations can prevent exposing API keys, tokens and credentials, remediating security misconfigurations.

  • IT infrastructure Protection and Monitoring System - ESET Based. Anti-Virus/Malware/Ransomware/Spam.

    BRADLEYSOFT

    ESET PROTECT Platform. Available in 5 Tiers. Advanced Multilayered Protection, Including Antivirus, Anti-Malware/Ransomware, Spam Filtering, Comprehensive Cloud Infrastructure Protection. Secure computers, mobiles, file servers, cloud endpoints. Full disk encryption capabilities on Windows and macOS. Advanced protection for Microsoft 365 & Google Workspace apps. Protects your Cloud Email. Patch Management.

  • Check Point Harmony Email & Collaboration

    CHARTERHOUSE VOICE & DATA LIMITED

    Provides organizations with complete full-suite protection providing security admins with an easy-to-deploy and manage platform, block sophisticated social engineering attacks such as impersonation, zero-day phishing and Business Email Compromise. Using AI-trained engines. Securing inbound, outbound, and internal emails from phishing attacks inspects the communication’s metadata, attachments, links and language

  • Wiz SaaS

    THE SERVER LABS LTD

    The Wiz Cloud Security Platform, helps development teams to build faster in the cloud by enabling security, dev and devsecops to work together in a self-service model built for the scale and speed of your cloud development Wiz is a single, comprehensive Single Platform for Everything Cloud Security

  • Veracode Security Labs

    TMC3 LIMITED

    Veracode Security Labs shifts AppSec knowledge left, giving developers hands-on training to confidently tackle modern threats by exploiting and patching real code, and applying DevSecOps principles to deliver secure code on-time. Regular assignments, progress reports, and leaderboard foster healthy competition, and encourage developers to continuously improve their secure coding skills.

  • Computacenter - Splunk Threat Detection Investigation and Response Suite

    COMPUTACENTER (UK) LIMITED

    Use any or all of Splunk’s Security products and services together to provide a unified security operations solution. On top of Splunk Enterprise or Splunk Cloud, combine Enterprise Security (SIEM), Mission Control, Splunk Attack Analyser (SAA), Splunk Threat Intelligence Management (TIM), Splunk SOAR, and Splunk UBA.

  • Open Banking Account Information Service (Mobile Connected)

    DGM AGILITY LIMITED

    DGM Agility is an authorised Account Information Service Provider (AISP) which enables us to provide a gateway to the Open Banking service. This service enables access to an aggregation of financial information for an individual or business. We collect, store, and make available the information as a service

  • Secris - automated vulnerability scanner

    MADE PURPLE LTD

    Secris is a comprehensive Cyber Security tool that automatically finds risks and vulnerabilities in your systems and infrastructure. Our Automated Vulnerability scanner monitors and secures your external endpoints, catalogue system inventory and software and automatically check them against current CVE's and emerging threats from a range of sources.

  • Forescout - EyeSight / EyeControl / EyeInspect

    BARRIER NETWORKS LIMITED

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assests.

  • Amazon WorkSpaces

    SOFTCAT PLC

    Amazon WorkSpaces offers you an easy way to provide a secure, managed, cloud-based virtual desktop experience to your end-users. Amazon WorkSpaces provides a fully managed service. With Amazon WorkSpaces, you can deliver a high-quality portable desktop, and applications, to your users on the device of their choice.

  • Check Point Harmony SaaS

    LRQA

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.

  • Heimdal Security - Unified Threat Platform

    NETWORK UTILITIES (SYSTEMS) LIMITED

    One Platform, One Agent, Complete Protection From ransomware and insider threat, to business compromise and anything in between, Heimdal™ protects your operational integrity by stopping even the most sophisticated cyberattacks from day one. Bundle includes: Threat Prevention, Patch & Asset Management Next-Gen Antivirus & MDM

  • altSRD - Secure Remote Desktop

    ALTIATECH LTD

    altSRD provides right-sized virtualized desktop solutions that balances security, productivity and value - Parallels RAS (remote application server): a flexible virtual application and desktop delivery solution. Parallels Secure Workspace (formerly Awingu): a highly secure and auditable access to your desktops, company files as well as legacy, web, and SaaS apps.

  • Safe2Drive Driving Licence Checking & Grey Fleet Service

    SAFE 2 DRIVE SOLUTIONS LIMITED

    UK driving licence checking and reporting solution that provides online status, entitlement, and conviction data for UK licence holders using the DVLA ADD service. For professional drivers, it returns CPC and tacho-card dates. Clients access their portal 24/7. The speed of a check response is immediate. A fully managed service.

  • Microsoft 365 Licencing

    Atlas Cloud

    Atlas Cloud are a Microsoft Preferred Partner. Let us take the hassle out of Microsoft 365 administration and lean on our specialist skills to migrate, upgrade security or boost adoption when necessary.

  • IBM Cloud Pak for Data

    IBM UNITED KINGDOM LIMITED

    IBM Cloud Pak for Data is a fully-integrated data and AI platform that modernizes how businesses collect, organize and analyze data to infuse AI throughout their organizations. It runs as a self-managed or fully-managed public cloud service on IBM Cloud with services and runtimes deployable to other cloud vendors.

  • Check Point CloudGuard Cloud Native Application Protection Platform (CNAPP)

    LRQA

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.

  • DXC Technology ServiceNow Resale

    ENTSERV UK LIMITED

    ServiceNow offers a portfolio of cloud-based applications that automate and manage enterprises. Our applications are built on a single service automation platform with one user interface, one code base, and one data model, delivering easy, automated upgrades. ITSM, HRSD, ITOM, SecOps, CSM, Helpdesk, Service Desk, Self-Service Portal.

  • Barrier Networks Crowdstrike Falcon Data Protection

    BARRIER NETWORKS LIMITED

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • Check Point Harmony SaaS

    ITogether

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.

  • Trellix MVISION Cloud

    INTEGRITY360 LIMITED

    The Trellix XDR ecosystem contains a suite of products that provide world-class cybersecurity through endpoint security and so much more.

  • Akamai API Security

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Palo Alto Networks Cortex XSIAM

    KHIPU NETWORKS LIMITED

    Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents.

  • MIS/Arbor

    INTERM IT (UK) LIMITED

    Fully managed support for Arbor. This will include but not limited to password resets, user creation, MFA configuration, Security configuration, end user support, group configuration, running reports, report creation, instructions manual usage, support portal.