Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1553 results found

1553 results found in Lot 2: Cloud software in the category Secure content and threat management

  • BigFix - Endpoint Management for any device: Desktop to Server to Cloud to Mobile

    HCL Technologies UK LImited

    BigFix-Endpoint Management: -IT Asset Discovery/Reporting -Patch Management/Remediation -Software Distribution -Self-Service Catalogue -Remote Control -Operating System (OS) deployment and image management -Compliance/vulnerability management -License usage/contract management -Advanced reporting + third party vulnerability tool integration -ServiceNow bi-directional integration -iOS, Android enrolment and policy management -Win10/Win11 + MacOS enrolment and policy management.

  • CDW OneTrust Governance, Risk, Compliance Technology

    CDW Limited

    Ensuring data quality, usability, and integrity are key factors in building trust in your organization. Strengthen your data stewardship by driving business value and complying with the latest privacy regulations and security frameworks, all within one unified platform.

  • Wordpress implementation

    Spindogs Ltd

    Implementation of mobile optimised, accessible Wordpress CMS websites. Spindogs' Wordpress CMS platform provides bespoke templates for content editors. GDPR compliant Wordpress CMS has an easy to use admin interface and flexible content editing features. Wordpress content management system is open-source, user friendly, and fully customisable.

  • Wonde Data Recovery

    BEYOND HOLDINGS LIMITED trading as Evouchers/Wonde

    A disaster recovery solution which automatically syncs school data throughout the school day. Should you experience a cyber incident, Wonde has your data protected and readily accessible for continuity. Data Recovery keeps your selected data protected, accessible, and up to date so you can keep your school open and running.

  • DCO and CSOC Malware and Intelligence

    NORTAL UK LIMITED

    A unique service combining the best of breed open source and commercial COTS technologies to enable cyber threat intelligence and malware analysis capabilities. 3DOT Solutions have proven pedigree in integrating technologies into a workable pipeline to ensure analysts are operational and organisations can operationalise CTI and malware analysis functions.

  • Heimdal Security - Next-Gen Endpoint Antivirus

    Network Utilities (Systems) Ltd

    Combining the techniques known by both traditional and next-gen antivirus engines, Heimdal™ Next-Gen Endpoint Antivirus is the endpoint detection and response tool that will become the the backbone of your enterprise. Cyber threats are no longer the activity of rogue hackers.

  • Tenable Lumin

    Phoenix Software Ltd

    Calculate, communicate and compare your cyber risk.

  • Devo (Cloud Native Logging & Security Analytics)

    2T Security Ltd

    Devo is a cloud-native logging and security analytics platform that releases the potential of your data to empower bold, confident action when it matters most. The Devo platform delivers real-time visibility, high-performance analytics, scalability, multitenancy, and low TCO for monitoring and securing business operations as enterprises migrate to the cloud.

  • CDW Check Point Harmony SaaS

    CDW Limited

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.

  • ControlPlane Enterprise for Flux CD

    CONTROL PLANE LIMITED

    CPE-Flux is a subscription-based offering designed to meet the stringent requirements of highly regulated organisations running production cloud native environments. CPE-Flux Continuous Delivery provides a secure, stable, and efficient solution for cloud native enterprises to depend on with confidence.

  • Tenable Vulnerability Management (formerly Tenable.io)

    Phoenix Software Ltd

    Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.

  • boxxe Tenable Identity Exposure

    BOXXE LIMITED

    Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.

  • Refapp

    Talentwise AB

    Refapp is a talent intelligence solution that helps recruiters conduct efficient, professional, and secure reference checks on each candidate. Using a fully automated and science-based workflow, you benefit from reliable and relevant information, the candidate from a fair process, and the reference from a smooth experience.

  • Cyber Resilience Training Platform (Hybrid)

    CYBEXER TECHNOLOGIES

    The Cyber Resilience Training Platform (SaaS) delivers a cloud-based solution for organizations to practice cyber resilience. It provides scalable, realistic simulations tailored to business and public sector cyber threats, emphasizing response and recovery to ensure organizations can withstand and quickly rebound from cyber incidents.

  • Sophos Managed Detection and Response Essentials (MDR) Endpoint

    Softcat Limited

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Vectra Cognito Recall

    INTEGRITY360 LIMITED

    Cognito Recall from Vectra is a cloud service, provided by Vectra, which stores network metadata in support of security investigation and threat hunting. Cognito Recall stores metadata that is extracted by network sensors and makes it available to analysts to help them hunt for threats.

  • Data Platform Software

    OAKLAND GROUP SERVICES LIMITED

    We design, build, and manage data platform capabilites using full stack cloud technologies that we customise and optimise to meet our client needs. We are technology agnostic, meaning we are experts across a range of technologies including Azure, AWS, Databricks, GCP, Github, and have experience operating in secure environments.

  • Sophos Central Mobile Advanced

    Planet IT

    Sophos Mobile is a Unified Endpoint Management and Mobile Threat Defense solution. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10 and macOS devices.

  • Time and Motion software to monitor company resources efficiency

    adappt

    Providing everything you need to help optimise your remote employees time efficiency, increases the overall productivity of your organisation, via non-intrusive, GDPR compliant software which collates circa 50,000 data points per user/day to extrapolate the causes of bottlenecks, help to forecast resourcing requirements, and mitigate against bad practice.

  • Check Point CloudGuard Web Application Firewall (WAF) As a Service

    Charterhouse Voice & Data

    Web Application and API protection. With deep application contextual analysis. Eliminates tradeoff between level of security and the complexity of managing application security. Whether applications are hosted in a data center or a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks and blocks automated attacks.

  • Wordpress maintenance

    Spindogs Ltd

    Maintenance of mobile optimised, accessible Wordpress content management system websites. Spindogs' Wordpress CMS platform provides bespoke templates for content editors. GDPR compliant Wordpress CMS has an easy to use admin interface and flexible content editing features. Wordpress content management system is open-source, user friendly, and fully customisable.

  • Google Chronicle SecOps

    SEP2 LIMITED

    Chronicle SecOps (SIEM & SOAR) , powered by Google infrastructure, enables cost-effective use of security telemetry to improve SOC productivity and combat modern threats.

  • Sophos Central Device Encryption

    Planet IT

    Sophos Central Device Encryption gives you the ability to manage full disk encryption from a single, integrated, web-based management center.

  • Forescout NetSec Core

    Chess CyberSecurity Ltd

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assests.

  • WithSecure EPP & EDR

    IOCO SOLUTIONS LIMITED

    WithSecure™ Elements is the unified cloud-based cyber security platform designed to reduce risk, complexity, and inefficiency. WithSecure™ Elements combines powerful predictive, preventive, and responsive security capabilities – all managed and monitored through a single security center.

  • Cyber Security

    CYMBALSTREAM SOLUTIONS LIMITED

    Cymbalstream offers a range of security solutions, including Managed Detection and Response (MDR), Cloud Detection and Response (CDR), and other advanced cybersecurity services. Cymbalstream leverages Arctic Wolf's technologies, threat intelligence, and expert security analysts to deliver 24/7 monitoring, detection, and response across an organisation's IT infrastructure.

  • Application Security Posture Management

    Phoenix Software Ltd

    CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • Rapid7 Insight ThreatCommand

    INTEGRITY360 LIMITED

    Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you to make informed decisions and rapidly respond to protect your business.

  • CDW Palo Alto Cortex XDR

    CDW Limited

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency.

  • Content Management System

    Spindogs Ltd

    Content management system development. Mobile optimised, accessible and open source. Spindogs' open source Content management system platform provides bespoke templates for content editors. GDPR compliant CMS has an easy to use admin interface and flexible content editing features. The content management system is open-source, user friendly, and fully customisable.