Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1698 results found

1698 results found in Lot 2: Cloud software in the category Security risk management

  • Advania Private Chat GPT solution

    Advania

    Advania's 'Private ChatGPT' solution, entirely hosted in your Azure environment, ensures data privacy and security. No data is shared with the internet or Microsoft/OpenAI, nor used for external model training. Our solution upholds 'trusted Azure' benefits like compliance and data sovereignty. Users interact via a web application featuring your branding.

  • WordPress Design, Development and Support

    Vu Digital

    Competitively priced UK development service for WordPress Applications. Our friendly and helpful UK-based WordPress team manage full lifecycle WordPress Discovery and Delivery. Our service can include user testing, workshops, CAT, QAT, Change Control, hosting, WordPress site maintenance, responsive SLA, resilient infrastructure, firewalls, security, monitoring, online helpdesk and WordPress issue tracking.

  • ZScaler ZIA, ZPA, Z-App Software License and Deployment Services

    AVELLA SECURITY LIMITED

    Following a Zero Trust Network Model, as recommended by NCSC, The service provides ZPA/ZIA licenses and additional deployment services for ZScaler Internet Access/Zscaler Private Access. Provides access to legacy applications, either hosted on site, or via the PSN Gateway. Supports XP, Win8, Win10, Mac, Mobiles, Browser based access.

  • AI Research & Testing Platform (SaaS)

    CYBEXER (UK) LTD

    AI Research & Testing Platform (SaaS) is a specialized, managed cyber range tailored for AI-related research, development, and testing activities. This advanced platform provides researchers with stable and scalable environments optimized for the complexities of AI, ensuring safe, efficient, and compliant algorithm advancement.

  • Advanced Analytical Data Science Capability to Counter Fraud

    VE3 GLOBAL LTD

    The Advanced Analytical Data Science Capability to Counter Fraud leverages sophisticated machine learning algorithms and statistical methods to identify, analyze, and prevent fraudulent activities. This service enhances security by detecting anomalies and predictive patterns, offering actionable insights that enable organizations to safeguard their operations and minimize financial losses effectively.

  • Proofpoint Security Awareness Training

    INTEGRITY360 LIMITED

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • Business Processes and Consultancy

    MASS CONSULTANTS LIMITED

    Within MASS are teams that are committed to research and innovation, product management, communications and marketing, and digital services. These teams successfully help find buyer problems and needs by following a design-thinking (‘discover, define, develop and deliver’) process, and ideate and solve by exploring data (secondary and primary).

  • Inoapps Subcontractor Management Cloud

    INOAPPS LIMITED

    With our Subcontractor Management module for Oracle Cloud Enterprise Resource Planning (ERP), you can keep track of all aspects of your subcontractor lifecycle. Inoapps' Subcontractor Management Cloud integrates with Oracle Cloud ERP to deliver holistic business support from beginning to end.

  • CDW Sophos Intercept X Mobile

    CDW LIMITED

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • Proofpoint Core - P1 Bundle

    INTEGRITY360 LIMITED

    Train end-users against threats. Augment threat-protection with a robust security-awareness training-programme integrated with email-security controls and phishing-simulations, cultural/knowledge assessments, comprehensive training/awareness. Tailored curriculum delivered to users based on actual threats. Full-catalogue of interactive training/tools designed to change end-user behaviour. Capabilities:threat simulations testing user response to phishing-attacks, 40+languages, 13 categories.

  • Delinea - Privilege Manager (Zero Trust & PEDM)

    PHOENIX SOFTWARE LIMITED

    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.

  • Sophos Central Email Advanced

    INTEGRITY360 LIMITED

    Sophos Email is a cloud-based secure email gateway solution for Sophos Central. Built to integrate seamlessly with popular email platforms, Sophos Email is engineered to keep businesses safe from email threats by simply stopping spam, phishing, malware, and data loss.

  • CDW Check Point CloudGuard Web Application Firewall (WAF)

    CDW LIMITED

    Check Point CloudGuard WAF provides Web Application and API protection. With deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security.

  • MTI Forcepoint ONE

    MTI TECHNOLOGY LIMITED

    Forcepoint ONE combines Zero Trust and SASE security technologies, including three secure access gateways and a variety of shared threat protection and data security services, all built on a cloud-native platform. This allows the public sector to adapt quickly to hybrid-working while keeping attackers out and sensitive data in.

  • Computacenter - Infoblox BloxOne Threat Défense

    COMPUTACENTER (UK) LIMITED

    Infoblox BloxOne Threat Defense Advanced, a comprehensive DNS Detection and Response (DNSDR) solution, detects threats and stops attacks by hunted/pre-campaign/DNS threat intelligence. Intelligent ecosystem integration/automation/AI-driven analytics to reduce MTTR, improve ROI of security tools, and SecOps efficiency. Lookalike Domain Monitoring/Takedown services enable businesses to efficiently protect their brand and customers.

  • Tessian ICES Email - Proofpoint copy

    BROOKCOURT SOLUTIONS LIMITED

    Proofpoint's Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • Computacenter - CrowdStrike Falcon Insight Extended Detection & Response (XDR)

    COMPUTACENTER (UK) LIMITED

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • UK Identity, Right to Work (RTW), and Criminal Record Checking (DBS) Services

    VERIFILE LIMITED

    UK Criminal Record Check (DBS, Disclosure Scotland, PVG, AccessNI) services, UK Right to Work Checks, and Identity Verification. Verifile's secure platform enables employers to select UK and International background check services. Integration with the DBS Disclosure and Barring Service and Disclosure Scotland ensures fastest turnarounds for UK criminal record checks.

  • Bitdefender Gravityzone - Next-Gen Endpoint Antivirus

    NETWORK UTILITIES (SYSTEMS) LIMITED

    Bitdefender GravityZone Enterprise is a cybersecurity solution for organisations, offering advanced threat protection and endpoint security for devices like servers, desktops, and mobile devices. It combines anti-malware, anti-ransomware, and Endpoint Detection and Response (EDR) capabilities to defend against various cyber threats.

  • SharePoint Intranet Development and Enterprise (Data, Content & Document) Management Services

    VE3 GLOBAL LTD

    We specialize in creating Intranet, Data, Content, and Document Management solutions utilizing both standard and customized functionalities of SharePoint 2013, SharePoint 2016, SharePoint 2019, and Online/O365 editions. Our Intranet solutions offer centralized communication and collaboration services, encompassing a comprehensive range of modern and classic SharePoint features.

  • AI Anomaly Cyber Security and Monitoring Behavioural Analytics

    ADAPPT LIMITED

    Defend against insider threat and cyber theft. Uses Deep Learning insights for business transformation. Improve your employee efficiency and increase your bottom line. Complex activity based Neural Networks are capable of rooting out unusual/intrusive behaviour.

  • Ethical Phishing Campaign

    VISIONIST LIMITED

    Targeted ethical phishing campaign tailored to your requirements to improve organisational resilience against phishing attacks. Cloud-based service proven to be highly effective at combatting email-borne cyber threats. Comprehensive reporting will demonstrate your improved cyber security awareness. Delivers a high return on investment (ROI) from the targeted campaign.

  • Amazon WorkMail

    SOFTCAT PLC

    Amazon WorkMail is a secure, managed business email and calendar service with support for existing desktop and mobile email client applications. Amazon WorkMail gives users the ability to seamlessly access their email, contacts, and calendars using the client application of their choice.

  • iboss Zero Trust Edge

    Bright Cyber

    The iboss Zero Trust platform utilises a containerised cloud architecture to enable easy migration from legacy appliances, whilst maintaining 100% dedicated IP address space in the cloud. This allows for PDNS intergration, and admin created GDPR Zones with dedicated UK datacentres. Packages include Filtering, Malware detection and Data Loss Prevention

  • Barracuda Email Protection

    CENTRAL NETWORKS AND TECHNOLOGIES LIMITED

    Barracuda Email Protection provides the most comprehensive protection against all 13 email threat types, from spam and ransomware to socially engineered threats such as spear phishing, business email compromise, and account takeover.

  • Forcepoint Cloud Access Security Broker (CASB)

    SAPPHIRE TECHNOLOGIES LIMITED

    Forcepoint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and. Information assurance restrictions on using the Cloud.

  • Konsolute ISO Certified Quality Management System (QMS)

    KONSOLUTE LTD

    Implement a robust ISO Certified Quality Management System (QMS) with our solution tailored for Microsoft 365. Manage, track, and audit your organisation's compliance and standards efficiently, enhancing quality management practices across your business operations.

  • Akamai Trafficpeak

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Neo Technology Data Strategy and Maturity Assessment Service

    NEO TECHNOLOGY LIMITED

    Neo Technology's Data Strategy and Maturity Assessment (DMA) Service outlines a strategic approach to leverage information assets in line with organisational goals. Conducted through DAMA or Central Digital & Data Office (CDDO), the DMA evaluates current capabilities and provides actionable insights. A roadmap guides improvements in governance, architecture, BI, MDM.

  • Palo Alto Cortex XDR

    BYTES SOFTWARE SERVICES LIMITED

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency. bssgc