Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2472 results found

2472 results found in Lot 2: Cloud software in the category Security

  • Netscout Arbor Enterprise Manager (DDoS Protection)

    Khipu Networks Limited

    This service provides a scalable inline threat prevention capability which can tune for your environment and keep the mass of online threats at bay from your infrastructure and your important business services.

  • SecurEnvoy MFA / Identity Access Platform

    CYBERLAB CONSULTING LTD

    SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.

  • Trustmarque Palo Alto Prisma Access

    TRUSTMARQUE SOLUTIONS LIMITED

    Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.

  • Right to Rent (RtR) checks

    Digidentity B.V.

    Digidentity's Right to Rent Verification service ensures that a person is who they say they are and has the right to Rrent in the UK. It is designed to meet the Home Office standard for identity verification and pre-tenancy checks. Tenants can complete the process remotely.

  • Check Point Harmony Mobile

    SOFTCAT PLC

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • CDW Proofpoint Security Awareness Training

    CDW LIMITED

    Proofpoint Security Awareness Training helps you deliver the right training to the right people at the right time. It turns your end users into a strong last line of defense in identifying cyber attacks and protecting your organization.

  • Miya Modern Modular EPR

    Alcidion UK Ltd

    Our modular EPR provides hospitals and integrated care systems with a modern, modular electronic patient record that supports clinical and administrative workflows. We orchestrate IT systems across health and care to create a rich data layer that is exposed to our smart technology and any applications our customers need.

  • boxxe Mimecast DMARC Analyzer

    BOXXE LIMITED

    Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC compliance.

  • Fortra Alert Logic Security Services

    THE SERVER LABS LTD

    Alert Logic delivers Security-as-a-Service combining cloud-based software and threat analytics with experts to defend your critical applications and workloads in cloud, hosted, on-premises and hybrid environments. Alert Logic protects your full application and infrastructure stack against attacks without the cost and time required to build and staff your own SOC.

  • Sophos Cloud Optix

    Planet IT

    Cloud-managed Endpoint Security including Threat Prevention, Behavioural Analysis & Threat Remediation as well as Endpoint Productivity Controls such as Device Control, Data Leakage Prevention, Application Control, Web Security etc.

  • Check Point CloudGuard Network Security (CGNS)

    SAPPHIRE TECHNOLOGIES LIMITED

    CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.

  • Klaxon Major Incident and Mass Notification Platform

    KLAXON TECHNOLOGIES LIMITED

    Klaxon is a major incident, mass notification and planned maintenance communications solution, helping organisations keep people safe, informed and productive during an incident, emergency or crisis. It is ideally suited for SME and Enterprise organisations and supports multiple use-cases such as IT downtime, Business Continuity, Disaster Recovery and Cyber-security communications.

  • Tenable Vulnerability Management Licences

    MONDAS CONSULTING LTD

    Purchase Tenable vulnerability management licences to utilise the Tenable Vulnerability management tool to prioritise and fix vulnerabilities within your cloud and on-prem environments. Tenable will scan your internal and external network to uncover hidden vulnerabilities.

  • CDW Proofpoint Insider Threat Management

    CDW LIMITED

    Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly. And we correlate user activity and data movement to protect you from insider-led data breaches.

  • Cybeready Autonomous Cyber Security Awareness Training

    Glemnet Ltd

    An Autonomous Security Awareness Program Built For The Enterprise A complete, fully-managed training program that transforms security culture. Pairing the most advanced training solutions: including phishing simulation, awareness training & compliance.

  • Email Verification

    Melissa Data Ltd

    Melissa’s email verification service can flag up to 95% of bad email addresses to increase deliverability, avoid high bounce rates and blacklisting, and protect your valuable sender reputation. Ping each email box in real time to validate, improve deliverability and reduce fraud. Mailbox validation and domain correction.

  • Trustmarque Palo Alto Cortex XSOAR

    TRUSTMARQUE SOLUTIONS LIMITED

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • Security (Information Assurance) Architecture

    MAZIK GLOBAL LIMITED

    The design, documentation and assurance of secure technical architectures used for hosting applications. e.g. the Security Architecture that underpins a Risk Management Accreditation Document Set or equivalent. The mitigation of vulnerabilities. Quality Assurance of existing capability. Use of government standards e.g. Security Policy Framework (SPF).

  • Legacy Application Migration

    CIRRO LIMITED

    Cirro helps to take historic applications, those not originally designed for cloud, to work efficiently as a SaaS application. Additionally the team of developers can help modify (or recode) aspects of your application or design and create (or containerise) secure, resilient and optimal Cloud SaaS applications.

  • Eagle Eye Cloud CCTV provided by Reliance High-Tech

    Reliance High-Tech Ltd

    Eagle Eye Networks VMS allows the transmission, storage and retrival of CCTV footage within a flexible cloud platform. Cloud stored video footage can be accessed by users from any location via web browser and mobile applications.

  • SentinelOne Managed Endpoint Detection & Response (MDR)

    EXPONENTIAL-E LIMITED

    SentinelOne Endpoint Detection & Response (EDR) makes it simple to secure your Windows, Mac and Linux. SentinelOne EDR will employs artificial intelligence and machine learning to detect, prevent, and respond to cyber threats faced by your organisation.

  • Cloudflare

    CDS

    CDS provides Cloudflare consulting, implementation, and managed services to protect websites and applications, improve website and application performance, identity and access management (zero trust), protect and accelerate networks and manage cloud deployments. CDS provides training , or can fully manage the environment on your behalf.

  • Proofpoint Core Plus Package

    PHOENIX SOFTWARE LIMITED

    Proofpoint's Core Plus package adds Email Fraud Defence, Secure Email Relay, and Supplier Threat Protection to the Core package offerings.

  • VouchforMe

    AVOCO SECURE LIMITED

    VouchforMe provides Vouching-as-a-Service. It is integrated into existing government identity services, like One Login, to verify people offline; a citizen unable to verify themselves using online methods can be vouched, offline, by a trusted Voucher, such as an educational establishment, health clinic, government office, etc.

  • Salesforce Community Cloud Services

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions Ltd specializes in Salesforce Community Cloud Services tailored for government departments. We collaborate with government entities to create secure,engaging online communities for citizens, employees, and stakeholders.Our expertise includes customized community design,seamless integration with existing systems,and comprehensive support to foster effective collaboration and communication within the government ecosystem.

  • Proofpoint Essentials

    BYTES SOFTWARE SERVICES LIMITED

    Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defence and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep business communications up and running at all time. bssgc

  • Galaxkey Secure Workspace

    INTEGRITY360 LIMITED

    Galaxkey Secure Workspace for secure file transfer, sharing and collaboration. Features include: secure collaboration, file sharing, encryption, unlimited file size. All with central management and complete white labelling capabilities. Encryption is CPA Certified by the NCSC.

  • Proofpoint Identity Threat Defense & Response (ITDR)

    INTEGRITY360 LIMITED

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Imprivata Vendor and Privileged Access Management

    SOMERFORD ASSOCIATES LIMITED

    Imprivata Privileged Access Management addresses critical security and compliance challenges by protecting privileged administrator access to an organization’s most sensitive IT systems and digital assets. Enterprise credential vaulting and session management of privileged users and Enterprise remote access to control and secure inbound 3rd party access to critical systems data

  • BeyondTrust Privileged Management

    INTEGRITY360 LIMITED

    BeyondTrust Privilege Management stops attacks by removing excessive privileges on Windows, Mac, Unix, Linux and Network Devices. The solution empowers organizations to enforce least privilege by eliminating admin and root access.