Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2514 results found

2514 results found in Lot 2: Cloud software in the category Security

  • Body Worn Video Solutions from Reliance Protect

    Reliance High-Tech Ltd

    Reliance Protect body worn camera solutions enhance incident deterrence and generate powerful evidence with HD video and audio. Included are options around customer live stream viewing and back into our in-house 24/7/365 Alarm Receiving Centre. Cloud storage and full control, editing and sharing recordings via the VideoManager portal.

  • Salesforce Financial Services Cloud Consulting

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions Ltd specializes in Salesforce Financial Services Cloud Consulting, tailored for government financial departments. Our expert consultants collaborate closely with government entities to optimize financial processes, enhance client relationships,and streamline workflows.We configure Salesforce Financial Services Cloud to align with specific governmental financial objectives,ensuring efficient and compliant financial operations.

  • Computacenter - IBM Security - Trusteer Pinpoint

    Computacenter (UK) Ltd

    IBM Trusteer helps organizations establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and patented machine learning, Trusteer provides a holistic approach to identifying customers, without negatively impacting user experience. Trusteer runs over 40 billion application accesses monthly and over 1 billion monthly user sessions.

  • Application Development Modernisation and Transformation Service

    I-NET SOFTWARE SOLUTIONS LTD

    INET has been supporting the digital agenda on a Global scale, delivering services locally. We use appropriate methodologies to support and drive changing business needs. With innovative development of cloud applications we continually support and innovate to deliver outstanding solutions in this ever changing, fast paced IT environment.

  • Sophos Managed Detection and Response Essentials (MDR) Server

    CHESS ICT LIMITED

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Sophos Managed Detection and Response Essentials (MDR) Endpoint

    BYTES SOFTWARE SERVICES LIMITED

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications. bssgc

  • Check Point CloudGuard Cloud Security Posture Management (CSPM)

    SOFTCAT PLC

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.

  • External Vulnerability Assessment Service

    LEIDOS INNOVATIONS UK LTD

    Leidos provides external vulnerability management as a service, using both the latest technologies and our team of experienced cyber analysts. They deliver assurance that your external infrastructure (web facing) is secured and any vulnerabilities are identified in the shortest possible time, reducing attack surface and mitigating risk of compromise.

  • Forcepoint Data Loss Prevention (DLP)

    Gradian Systems Ltd

    Follow your data across networks and devices—both at rest, in motion and in use. Create and enforce policies that provision the access and movement of data to prevent data breaches and help ensure compliance with Forcepoint Data Loss Prevention (DLP).

  • CDW Microsoft Exchange Online Kiosk

    CDW LIMITED

    Exchange Online Kiosk is suited for deskless workers to provide business class email, contact management and calendaring services with up to 2Gb per user. Includes anti-malware and spam filtering. Access is also provided to Shared Mailboxes and Group Mailboxes.

  • Sophos Central Email Advanced

    CHESS ICT LIMITED

    Sophos Email is a cloud-based secure email gateway solution built to integrate seamlessly with popular email platforms (Exchange Online, Google Suite etc..). Sophos Email is engineered to keep businesses safe from email threats such as Malware, Zero Day, Phishing, Spam while also preventing Data Loss and providing Email Encryption

  • Heimdal Security - Next-gen Antivirus, Ransomware Encryption Protection & Patch and Asset Manager

    BITZ 'N' PC'Z LIMITED

    Heimdal Security elevates your digital defense, seamlessly integrating powerful anti-virus and firewall capabilities with cutting-edge ransomware protection and vulnerability management, ensuring unparalleled security for your data and systems. This bundle includes: • Next-Gen Anti-Virus, Firewall & MDM • Ransomware Encryption Protection • Patch & Asset Management

  • Imperago Door Access Control

    HFX Limited

    Cloud based Imperago door Access Control is simple to install, cost effective, robust, easy to use and up and running in days. See at a glance, exactly where your staff are. Imperago uses card or biometric technology, using the latest smart devices. Utilising the latest contactless and temperature sensing technology.

  • Stone Secure Access Service Edge (SASE) - Cisco

    Stone Technologies Limited trading as Converge Technology Solutions

    Cisco Secure Connect is a turnkey, unified Secure Access Service Edge (SASE) solution delivering seamless, secure connectivity with a consistent operating model across premises to cloud, to make managing networking/security easy in a single dashboard. This converged platform solution brings together Cisco Networking/Security Clouds optimising troubleshooting and streamlining configuration.

  • Gemini for Google Workspace Enterprise

    Levett Consultancy Ltd

    Gemini for Google Workspace Enterprise is for organisations requiring heavy use of generative AI or needing more advanced features and capabilities. Gemini empowers teams to streamline tasks, enhance professionalism, and unleash creativity. Conduct insightful research, craft impactful communications, and generate stunning visuals – all within your familiar Google Workspace tools.

  • Computacenter - IBM Security - MaaS360 with Watson

    Computacenter (UK) Ltd

    Cognitive UEM is the future of mobile management and security. Managing endpoints plus their users and data is a time-consuming task with conventional mobile device management (MDM) and enterprise mobile management (EMM) solutions. Cognitive unified endpoint management (UEM) approach that consolidates the management of smartphones, tablets, laptops, desktops, wearables &IoT

  • Varonis Data Security Platform

    BYTES SOFTWARE SERVICES LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. bssgc

  • Sophos Central Intercept X Advanced for Server with XDR

    INTEGRITY360 LIMITED

    Central Intercept X Advanced for Server with Extended Detection and Response (XDR) includes all features in Central Intercept X Advanced for Server, plus powerful features for detection and remediation. Ask and answer business critical IT operations and threat hunting questions with Live Discover and respond remotely with Live Response.

  • Video and Image Analysis

    Roke Manor Research

    Roke is pioneering Machine Learning & AI powered Image and Video Analytics, our platforms rapidly process media content at scale and performs Deep Learning based content detection, moderation, summarisation and linking functions. A core service provided to UK law enforcement automatically detects and categorise Child Sexual Exploitation images and videos.

  • Secure File Storage

    MegaNexus Ltd

    Secure File Storage is a cloud-based storage and sharing platform, designed to enhance file management within secure environments, VCSEs, local authorities, schools, and further education institutes. It streamlines the processes of document access, storage, and collaboration, ensuring the secure handling of sensitive information and adherence to data protection regulations.

  • Microsoft Sentinel

    Creative Networks

    Microsoft Sentinel is a cloud-based SIEM service aiding in threat detection, investigation, and response across enterprise infrastructures. It aggregates and analyses security data from diverse sources, utilises advanced analytics and machine learning, and offers customisable dashboards and automation to enhance security operations and incident response efficiency.

  • Enterprise Architecture - Cloud Software

    Slowhorse Ltd

    Provision of Cloud-based tooling to deliver Enterprise Architecture and Cyber Security services, together with associated consultancy services and expertise. Slowhorse Ltd will provide/configure Cloud-hosted toolsets for Enterprise Architecture (e.g. iServer; Archi; LeanIX; Power BI) and Cyber Security and, where requested, the consultancy services to maximise the value of this tooling.

  • Sophos Intercept X Advanced

    Cyberlab

    Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.

  • Secure UK Gitlab Server Service for the Cloud

    Viewdeck Consulting Limited

    Secure GitLab Server Service for the Cloud provides a comprehensive platform for managing code repositories securely. With features like version control, continuous integration, and access management, developers can collaborate effectively, ensure code quality, and streamline workflows. Experience enhanced security, improved collaboration, and efficient development processes with our cloud-based GitLab service.

  • Barracuda Email Protection Advanced

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Barracuda Email Protection Advanced is a comprehensive email security protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks.

  • Workday Optimization Consulting

    HYPER TALENT SOLUTIONS LTD

    Nutanix Disaster Recovery Planning Service offers robust strategies to safeguard critical data and applications against unforeseen events. It focuses on creating resilient, rapid recovery solutions, minimizing downtime and data loss. This service ensures business continuity through customized recovery plans, leveraging advanced technologies for efficient and reliable disaster response.

  • Windows 365

    VE3 GLOBAL LTD

    Windows 365 is our expertise at VE3, offering secure streaming of your Windows experience, including personalized apps, content, and settings, from the Microsoft cloud to any device with your Windows 365 Cloud PC.

  • ArkDNS - DNS Filtering system

    Made Purple Ltd

    ArkDNS provides AI powered DNS Filtering and Security for your network. Get protection from malware, ransomware and phishing at the DNS level protecting all of your devices. Filter domains based on categories or whitelists making sure all sites are safe for work and forcing SafeSearch on all search engines.

  • Check Point CloudGuard Cloud Security Posture Management (CSPM)

    INTEGRITY360 LIMITED

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.

  • Business Process Modeling and Workflow Design

    LEFKE IT LIMITED

    LefkeIT excels in Business Process Modeling and Workflow Design. Our expert team collaborates closely with stakeholders to analyze existing processes and design optimized workflows. Through meticulous modeling, we streamline operations, improve efficiency, and align processes with organizational goals. Trust us to enhance your business processes and drive productivity effectively.