Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1725 results found

1725 results found in Lot 2: Cloud software in the category Security risk management

  • SharePoint Intranet Development and Enterprise (Data, Content & Document) Management Services

    VE3 GLOBAL LTD

    We specialize in creating Intranet, Data, Content, and Document Management solutions utilizing both standard and customized functionalities of SharePoint 2013, SharePoint 2016, SharePoint 2019, and Online/O365 editions. Our Intranet solutions offer centralized communication and collaboration services, encompassing a comprehensive range of modern and classic SharePoint features.

  • AI Anomaly Cyber Security and Monitoring Behavioural Analytics

    ADAPPT LIMITED

    Defend against insider threat and cyber theft. Uses Deep Learning insights for business transformation. Improve your employee efficiency and increase your bottom line. Complex activity based Neural Networks are capable of rooting out unusual/intrusive behaviour.

  • Ethical Phishing Campaign

    VISIONIST LIMITED

    Targeted ethical phishing campaign tailored to your requirements to improve organisational resilience against phishing attacks. Cloud-based service proven to be highly effective at combatting email-borne cyber threats. Comprehensive reporting will demonstrate your improved cyber security awareness. Delivers a high return on investment (ROI) from the targeted campaign.

  • Amazon WorkMail

    SOFTCAT PLC

    Amazon WorkMail is a secure, managed business email and calendar service with support for existing desktop and mobile email client applications. Amazon WorkMail gives users the ability to seamlessly access their email, contacts, and calendars using the client application of their choice.

  • iboss Zero Trust Edge

    Bright Cyber

    The iboss Zero Trust platform utilises a containerised cloud architecture to enable easy migration from legacy appliances, whilst maintaining 100% dedicated IP address space in the cloud. This allows for PDNS intergration, and admin created GDPR Zones with dedicated UK datacentres. Packages include Filtering, Malware detection and Data Loss Prevention

  • Barracuda Email Protection

    CENTRAL NETWORKS AND TECHNOLOGIES LIMITED

    Barracuda Email Protection provides the most comprehensive protection against all 13 email threat types, from spam and ransomware to socially engineered threats such as spear phishing, business email compromise, and account takeover.

  • Forcepoint Cloud Access Security Broker (CASB)

    SAPPHIRE TECHNOLOGIES LIMITED

    Forcepoint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and. Information assurance restrictions on using the Cloud.

  • Konsolute ISO Certified Quality Management System (QMS)

    KONSOLUTE LTD

    Implement a robust ISO Certified Quality Management System (QMS) with our solution tailored for Microsoft 365. Manage, track, and audit your organisation's compliance and standards efficiently, enhancing quality management practices across your business operations.

  • Akamai Trafficpeak

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Neo Technology Data Strategy and Maturity Assessment Service

    NEO TECHNOLOGY LIMITED

    Neo Technology's Data Strategy and Maturity Assessment (DMA) Service outlines a strategic approach to leverage information assets in line with organisational goals. Conducted through DAMA or Central Digital & Data Office (CDDO), the DMA evaluates current capabilities and provides actionable insights. A roadmap guides improvements in governance, architecture, BI, MDM.

  • Palo Alto Cortex XDR

    BYTES SOFTWARE SERVICES LIMITED

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency. bssgc

  • MTI Delinea Secret Server Cloud Privilege Access Management & Privilege Manager

    MTI TECHNOLOGY LIMITED

    Delinea Secret Server Cloud is an online password manager hosted in Azure, a highly secure and available platform. Secret Server has layers of built-in security with easy access management for IT admins, robust segregation of role based duties, AES 256 bit encryption, 60+ out-of-the box reports to demonstrate compliance.

  • Barracuda SecureEdge (SASE)

    PRIMESYS LTD

    Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, anytime, anywhere, providing security inspection and policy enforcement in the cloud, at branch, or on device. Barracuda SecureEdge delivers enterprise-grade security including Zero Trust Network Access (ZTNA), Firewall-as-a-Service, web security, fully-integrated office connectivity with Secure SD-WAN.

  • PSAT Security Awareness Training - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • CyberCyte EAR

    Grove Information Systems

    CyberCyte EAR is a Blue Team Platform for discovering and responding to threats and risks more accurately by creating a consolidated analysis framework integrating asset, threat, hardening baseline, and vulnerability information.

  • Informu Information Asset Register and Management System

    INFORMU SOLUTIONS LIMITED

    The Informu Information Asset Register / Management system stores asset data gathered during an information / system audit, as well as managing your Records of Processing Activities. It also stores your records retention policies, to which assets are tagged. You can keep an audit trail of actions related to assets.

  • Wiz

    SOFTCAT PLC

    Wiz is a CNAPP security platform that helps customers protect everything they build and run in the cloud, providing full-stack agentless cross-cloud support for AWS, Azure, GCP, OCI and Kubernetes. Providing Wiz Code, Wiz Sensor and Wiz Premium Support

  • Evolve Security Automation

    2T SECURITY LTD

    Evolve delivers on-demand specialist security capabilities that augment your teams, build security capabilities into your business, and maximize security budgets delivering greater coverage and improved security posture of your business. This removes the need to hire additional employees, enabling your existing team to focus their time on strategic security activities.

  • Netwrix Recover for Active Directory

    INTEGRITY360 LIMITED

    Netwrix Recovery for ActiveDirectory helps organizations avoid security breaches and business disruptions by enabling administrators to quickly revert entire AD objects or just a single attribute to a known good state, without downtime. This comprehensive solution handles AD objects, attributes, group memberships, DNS entries, Group Policy objects (GPOs), and more

  • Barrier Networks Secure Data Workflow (OPSWAT MetaDefender)

    Barrier Networks

    MetaDefender is used by organizations that require the highest level of security, including critical infrastructure, government agencies, and financial institutions, to enable a secure way to get files in and out of an organization, and prevent cyber security threats.

  • Recycling of ICT, Telecomms & Cable to WEEE and EA Regulation Standards

    Network 2 Supplies Ltd

    N2S are the leaders in pursuit of zero waste technology, delivering a disposal service that consistently returns technology waste to maximum re-use. We can offer secure collection bins for use in data centre environments. These are then transported to N2S where the data is cleansed and the drives destroyed.

  • CDW Check Point Harmony SASE

    CDW LIMITED

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • Managed Azure Virtual Desktop

    Intercity Technology Limited

    Intercity’s Managed Azure Virtual Desktop is a secure, scalable virtual desktop solution. It enables access to Windows desktops and applications from anywhere, on any device with centralised management and automated updates. Improving productivity and flexibility while reducing IT overhead. Ideal for organisations embracing remote work and cloud-based desktop solutions.

  • Crisis Simulation Service

    Core to Cloud Ltd

    Improve your organisation's resilience and ability to respond to cyberattack incidents and threats through the delivery of a series of crisis simulation exercises. The exercises are gamified with organisation relevant, interactive questions on a web interface. Full reports are shared to highlight performance and areas of improvement.

  • Forcepoint Data Guard

    Cyberlab

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • Identity Threat Defense & Response (ITDR) - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Varonis SaaS Data Security Platform

    SOFTCAT PLC

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • Geopolitical Intelligence

    SAPPHIRE TECHNOLOGIES LIMITED

    Our service delivers critical insights into the shifting dynamics in every geographic area that matters to you. Accelerate your decision-making with contextualized OSINT data about geopolitical threats and trends. We fuse open source, dark web, technical sources, and original research. By dynamically linking, categorising, and updating intelligence in real time,

  • Sentinel Hotline

    YUDU Sentinel

    Automated Cloud based information lines for people to call in an incident. Reporting hotlines for messages and a message handling console. Deliver crisis updates by simply typing a message with AI conversion to Voice. 27 languages supported. A low cost call centre.

  • Computacenter - Proofpoint Complete Package

    COMPUTACENTER (UK) LIMITED

    Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.