Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1725 results found

1725 results found in Lot 2: Cloud software in the category Security risk management

  • Safe2Drive Driving Licence Checking & Grey Fleet Service

    SAFE 2 DRIVE SOLUTIONS LIMITED

    UK driving licence checking and reporting solution that provides online status, entitlement, and conviction data for UK licence holders using the DVLA ADD service. For professional drivers, it returns CPC and tacho-card dates. Clients access their portal 24/7. The speed of a check response is immediate. A fully managed service.

  • Microsoft 365 Licencing

    Atlas Cloud Ltd

    Atlas Cloud are a Microsoft Preferred Partner. Let us take the hassle out of Microsoft 365 administration and lean on our specialist skills to migrate, upgrade security or boost adoption when necessary.

  • IBM Cloud Pak for Data

    IBM UNITED KINGDOM LIMITED

    IBM Cloud Pak for Data is a fully-integrated data and AI platform that modernizes how businesses collect, organize and analyze data to infuse AI throughout their organizations. It runs as a self-managed or fully-managed public cloud service on IBM Cloud with services and runtimes deployable to other cloud vendors.

  • Check Point CloudGuard Cloud Native Application Protection Platform (CNAPP)

    LRQA

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.

  • DXC Technology ServiceNow Resale

    ENTSERV UK LIMITED

    ServiceNow offers a portfolio of cloud-based applications that automate and manage enterprises. Our applications are built on a single service automation platform with one user interface, one code base, and one data model, delivering easy, automated upgrades. ITSM, HRSD, ITOM, SecOps, CSM, Helpdesk, Service Desk, Self-Service Portal.

  • Barrier Networks Crowdstrike Falcon Data Protection

    Barrier Networks

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • Check Point Harmony SaaS

    ITogether

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.

  • Trellix MVISION Cloud

    INTEGRITY360 LIMITED

    The Trellix XDR ecosystem contains a suite of products that provide world-class cybersecurity through endpoint security and so much more.

  • Akamai API Security

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Palo Alto Networks Cortex XSIAM

    KHIPU NETWORKS LIMITED

    Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents.

  • MIS/Arbor

    INTERM IT (UK) LIMITED

    Fully managed support for Arbor. This will include but not limited to password resets, user creation, MFA configuration, Security configuration, end user support, group configuration, running reports, report creation, instructions manual usage, support portal.

  • Advania Private Chat GPT solution

    Advania

    Advania's 'Private ChatGPT' solution, entirely hosted in your Azure environment, ensures data privacy and security. No data is shared with the internet or Microsoft/OpenAI, nor used for external model training. Our solution upholds 'trusted Azure' benefits like compliance and data sovereignty. Users interact via a web application featuring your branding.

  • WordPress Design, Development and Support

    Vu Digital

    Competitively priced UK development service for WordPress Applications. Our friendly and helpful UK-based WordPress team manage full lifecycle WordPress Discovery and Delivery. Our service can include user testing, workshops, CAT, QAT, Change Control, hosting, WordPress site maintenance, responsive SLA, resilient infrastructure, firewalls, security, monitoring, online helpdesk and WordPress issue tracking.

  • ZScaler ZIA, ZPA, Z-App Software License and Deployment Services

    AVELLA SECURITY LIMITED

    Following a Zero Trust Network Model, as recommended by NCSC, The service provides ZPA/ZIA licenses and additional deployment services for ZScaler Internet Access/Zscaler Private Access. Provides access to legacy applications, either hosted on site, or via the PSN Gateway. Supports XP, Win8, Win10, Mac, Mobiles, Browser based access.

  • AI Research & Testing Platform (SaaS)

    CYBEXER TECHNOLOGIES

    AI Research & Testing Platform (SaaS) is a specialized, managed cyber range tailored for AI-related research, development, and testing activities. This advanced platform provides researchers with stable and scalable environments optimized for the complexities of AI, ensuring safe, efficient, and compliant algorithm advancement.

  • Advanced Analytical Data Science Capability to Counter Fraud

    VE3 GLOBAL LTD

    The Advanced Analytical Data Science Capability to Counter Fraud leverages sophisticated machine learning algorithms and statistical methods to identify, analyze, and prevent fraudulent activities. This service enhances security by detecting anomalies and predictive patterns, offering actionable insights that enable organizations to safeguard their operations and minimize financial losses effectively.

  • Proofpoint Security Awareness Training

    INTEGRITY360 LIMITED

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • Business Processes and Consultancy

    MASS CONSULTANTS LIMITED

    Within MASS are teams that are committed to research and innovation, product management, communications and marketing, and digital services. These teams successfully help find buyer problems and needs by following a design-thinking (‘discover, define, develop and deliver’) process, and ideate and solve by exploring data (secondary and primary).

  • Inoapps Subcontractor Management Cloud

    INOAPPS LIMITED

    With our Subcontractor Management module for Oracle Cloud Enterprise Resource Planning (ERP), you can keep track of all aspects of your subcontractor lifecycle. Inoapps' Subcontractor Management Cloud integrates with Oracle Cloud ERP to deliver holistic business support from beginning to end.

  • CDW Sophos Intercept X Mobile

    CDW LIMITED

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • Proofpoint Core - P1 Bundle

    INTEGRITY360 LIMITED

    Train end-users against threats. Augment threat-protection with a robust security-awareness training-programme integrated with email-security controls and phishing-simulations, cultural/knowledge assessments, comprehensive training/awareness. Tailored curriculum delivered to users based on actual threats. Full-catalogue of interactive training/tools designed to change end-user behaviour. Capabilities:threat simulations testing user response to phishing-attacks, 40+languages, 13 categories.

  • Delinea - Privilege Manager (Zero Trust & PEDM)

    PHOENIX SOFTWARE LIMITED

    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.

  • Sophos Central Email Advanced

    INTEGRITY360 LIMITED

    Sophos Email is a cloud-based secure email gateway solution for Sophos Central. Built to integrate seamlessly with popular email platforms, Sophos Email is engineered to keep businesses safe from email threats by simply stopping spam, phishing, malware, and data loss.

  • CDW Check Point CloudGuard Web Application Firewall (WAF)

    CDW LIMITED

    Check Point CloudGuard WAF provides Web Application and API protection. With deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security.

  • MTI Forcepoint ONE

    MTI TECHNOLOGY LIMITED

    Forcepoint ONE combines Zero Trust and SASE security technologies, including three secure access gateways and a variety of shared threat protection and data security services, all built on a cloud-native platform. This allows the public sector to adapt quickly to hybrid-working while keeping attackers out and sensitive data in.

  • Computacenter - Infoblox BloxOne Threat Défense

    COMPUTACENTER (UK) LIMITED

    Infoblox BloxOne Threat Defense Advanced, a comprehensive DNS Detection and Response (DNSDR) solution, detects threats and stops attacks by hunted/pre-campaign/DNS threat intelligence. Intelligent ecosystem integration/automation/AI-driven analytics to reduce MTTR, improve ROI of security tools, and SecOps efficiency. Lookalike Domain Monitoring/Takedown services enable businesses to efficiently protect their brand and customers.

  • Tessian ICES Email - Proofpoint copy

    BROOKCOURT SOLUTIONS LIMITED

    Proofpoint's Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • Computacenter - CrowdStrike Falcon Insight Extended Detection & Response (XDR)

    COMPUTACENTER (UK) LIMITED

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • UK Identity, Right to Work (RTW), and Criminal Record Checking (DBS) Services

    VERIFILE LIMITED

    UK Criminal Record Check (DBS, Disclosure Scotland, PVG, AccessNI) services, UK Right to Work Checks, and Identity Verification. Verifile's secure platform enables employers to select UK and International background check services. Integration with the DBS Disclosure and Barring Service and Disclosure Scotland ensures fastest turnarounds for UK criminal record checks.

  • Bitdefender Gravityzone - Next-Gen Endpoint Antivirus

    Network Utilities (Systems) Ltd

    Bitdefender GravityZone Enterprise is a cybersecurity solution for organisations, offering advanced threat protection and endpoint security for devices like servers, desktops, and mobile devices. It combines anti-malware, anti-ransomware, and Endpoint Detection and Response (EDR) capabilities to defend against various cyber threats.