Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2472 results found

2472 results found in Lot 2: Cloud software in the category Security

  • Stone Secure Access Service Edge (SASE) - Cisco

    Stone Technologies Limited trading as Converge Technology Solutions

    Cisco Secure Connect is a turnkey, unified Secure Access Service Edge (SASE) solution delivering seamless, secure connectivity with a consistent operating model across premises to cloud, to make managing networking/security easy in a single dashboard. This converged platform solution brings together Cisco Networking/Security Clouds optimising troubleshooting and streamlining configuration.

  • Gemini for Google Workspace Enterprise

    Levett Consultancy Ltd

    Gemini for Google Workspace Enterprise is for organisations requiring heavy use of generative AI or needing more advanced features and capabilities. Gemini empowers teams to streamline tasks, enhance professionalism, and unleash creativity. Conduct insightful research, craft impactful communications, and generate stunning visuals – all within your familiar Google Workspace tools.

  • Computacenter - IBM Security - MaaS360 with Watson

    Computacenter (UK) Ltd

    Cognitive UEM is the future of mobile management and security. Managing endpoints plus their users and data is a time-consuming task with conventional mobile device management (MDM) and enterprise mobile management (EMM) solutions. Cognitive unified endpoint management (UEM) approach that consolidates the management of smartphones, tablets, laptops, desktops, wearables &IoT

  • Varonis Data Security Platform

    BYTES SOFTWARE SERVICES LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. bssgc

  • Sophos Central Intercept X Advanced for Server with XDR

    INTEGRITY360 LIMITED

    Central Intercept X Advanced for Server with Extended Detection and Response (XDR) includes all features in Central Intercept X Advanced for Server, plus powerful features for detection and remediation. Ask and answer business critical IT operations and threat hunting questions with Live Discover and respond remotely with Live Response.

  • Video and Image Analysis

    Roke Manor Research

    Roke is pioneering Machine Learning & AI powered Image and Video Analytics, our platforms rapidly process media content at scale and performs Deep Learning based content detection, moderation, summarisation and linking functions. A core service provided to UK law enforcement automatically detects and categorise Child Sexual Exploitation images and videos.

  • Secure File Storage

    MegaNexus Ltd

    Secure File Storage is a cloud-based storage and sharing platform, designed to enhance file management within secure environments, VCSEs, local authorities, schools, and further education institutes. It streamlines the processes of document access, storage, and collaboration, ensuring the secure handling of sensitive information and adherence to data protection regulations.

  • Microsoft Sentinel

    Creative Networks

    Microsoft Sentinel is a cloud-based SIEM service aiding in threat detection, investigation, and response across enterprise infrastructures. It aggregates and analyses security data from diverse sources, utilises advanced analytics and machine learning, and offers customisable dashboards and automation to enhance security operations and incident response efficiency.

  • Enterprise Architecture - Cloud Software

    Slowhorse Ltd

    Provision of Cloud-based tooling to deliver Enterprise Architecture and Cyber Security services, together with associated consultancy services and expertise. Slowhorse Ltd will provide/configure Cloud-hosted toolsets for Enterprise Architecture (e.g. iServer; Archi; LeanIX; Power BI) and Cyber Security and, where requested, the consultancy services to maximise the value of this tooling.

  • Sophos Intercept X Advanced

    Cyberlab

    Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.

  • Barracuda Email Protection Advanced

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Barracuda Email Protection Advanced is a comprehensive email security protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks.

  • Workday Optimization Consulting

    HYPER TALENT SOLUTIONS LTD

    Nutanix Disaster Recovery Planning Service offers robust strategies to safeguard critical data and applications against unforeseen events. It focuses on creating resilient, rapid recovery solutions, minimizing downtime and data loss. This service ensures business continuity through customized recovery plans, leveraging advanced technologies for efficient and reliable disaster response.

  • Windows 365

    VE3 GLOBAL LTD

    Windows 365 is our expertise at VE3, offering secure streaming of your Windows experience, including personalized apps, content, and settings, from the Microsoft cloud to any device with your Windows 365 Cloud PC.

  • ArkDNS - DNS Filtering system

    Made Purple Ltd

    ArkDNS provides AI powered DNS Filtering and Security for your network. Get protection from malware, ransomware and phishing at the DNS level protecting all of your devices. Filter domains based on categories or whitelists making sure all sites are safe for work and forcing SafeSearch on all search engines.

  • Check Point CloudGuard Cloud Security Posture Management (CSPM)

    INTEGRITY360 LIMITED

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.

  • Business Process Modeling and Workflow Design

    LEFKE IT LIMITED

    LefkeIT excels in Business Process Modeling and Workflow Design. Our expert team collaborates closely with stakeholders to analyze existing processes and design optimized workflows. Through meticulous modeling, we streamline operations, improve efficiency, and align processes with organizational goals. Trust us to enhance your business processes and drive productivity effectively.

  • Check Point CloudGuard Cloud Native Application Protection Platform (CNAPP)

    INTEGRITY360 LIMITED

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.

  • Check Point CloudGuard Code Security (Spectral)

    INTEGRITY360 LIMITED

    CloudGuard Code Security provides automated tools to detect code vulnerabilities, identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends. With CloudGuard Code Security, organizations can prevent exposing API keys, tokens and credentials, and remediate security misconfigurations. CloudGuard Code Security ensures security without compromising productivity.

  • CDW Check Point Harmony Email & Collaboration

    CDW LIMITED

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • e2e Cloud Protective Monitoring and SOC Service

    e2e-assure Ltd

    Incident Response, Case Management, log event alert monitoring, GPG-13, threat intelligence, darkweb, IPS/IDS, traffic analysis, SOC, CERT, Reporting, Collaboration, packet capture, Audit Compliance, EDR, MDR, XDR, NDR, TDR, Privileged User, MDM, Vulnerability Assessment, Cloud Security, Sentinel, Defender, MDE, MCAS, Azure, AWS, CloudTrail, CloudWatch, GuardDuty, Security Hub, GCP, Google WorkSpace, Oracle

  • Ultima and Proofpoint Core - P0 Bundle

    ULTIMA BUSINESS SOLUTIONS LTD.

    Resolve email threats across the entire attack chain, from detection to response. Including automating abuse mailbox management by removing phishing emails. Addresses threats such as phishing, business email compromise (BEC), supplier fraud, ransomware and other malware. Gain visibility into who and how they are being attacked, clicks and phishing reports.

  • Arena

    Hicom Technology Ltd

    Market-leading compliance management system enabling multi-site/multi-asset organisations to manage essential business practices, inter-company communications and reporting processes, ensuring compliance with established regulations. Currently used by over 200,000 users in 5,000+ sites worldwide, Arena is a modular solution providing business with a powerful tool that helps reduce business risk.

  • Cyber Security, Policy Management & Compliance Platform

    Policy Monitor Limited

    Policy Monitor provides a cybersecurity management platform, Cyber Security Policy Monitor (CSPM). CSPM gives you a centralised platform to support your organisation through complex industry-certified accreditations, to create and implement internal security policies, train your staff, scan for vulnerabilities and establish best practices to provide the best defence against criminals.

  • Bus Operator Performance Reporting

    R2P Systems UK Ltd

    This service allows bus operators and local authorities to report on arrival/departures and lateness of vehicles. It provides detailed arrivals/departure times at bus stops along journeys. At the high level, it provides a complex timetable schedule heading report to see how vehicles are performing against timetables.

  • Third Party Assurance Platform

    TMC3 LIMITED

    OneTrust Third-Party Management streamlines third party assurance for public sector entities, offering comprehensive risk monitoring, due diligence automation, and robust compliance tools. Our solution effectively manages third-party risks across security, privacy, and ESG domains, enhancing trust and compliance.

  • CDW Proofpoint Advanced Package

    CDW LIMITED

    Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings. Proofpoint CORE Plus - Requires CORE P0 or CORE P1

  • PINS

    SAADIAN TECHNOLOGIES UK LIMITED

    The PINS prison intelligence service provides a web-based view of the prison population and facilitates the pro-active tracking of offenders through their prison sentences. Releases and movements of offenders results in email notifications. PINS is offered as OFFICIAL or OFFICIAL SENSITIVE SaaS or in a private cloud based on IaaS.

  • Micro Focus, now OpenText - NetIQ Identity Intelligence on SaaS

    MICRO FOCUS

    NetIQ Identity Intelligence service provides a cloud-based enterprise service that is intended: To assess risk based on insights from identity information Apply methods to remove excessive, anomalous, or erroneous entitlements Improve the ongoing identity governance process, including risk reporting

  • Cyber Security Network Sensor

    ACTIONABLE LTD

    REACH CYBER provides the latest generation cyber security network sensor. Using analytics and AI to not only protect and detect cyber breaches, but also provide the right data you need to identify vulnerabilities and attack vectors. The platform incorporates the REACH data acquisition engine for precision cyber data analytics.

  • CrowdStrike Falcon® Counter Adversary Operations

    Computacenter (UK) Ltd

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.