Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1741 results found

1741 results found in Lot 2: Cloud software in the category Security risk management

  • CDW Check Point CloudGuard Web Application Firewall (WAF)

    CDW LIMITED

    Check Point CloudGuard WAF provides Web Application and API protection. With deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security.

  • MTI Forcepoint ONE

    MTI TECHNOLOGY LIMITED

    Forcepoint ONE combines Zero Trust and SASE security technologies, including three secure access gateways and a variety of shared threat protection and data security services, all built on a cloud-native platform. This allows the public sector to adapt quickly to hybrid-working while keeping attackers out and sensitive data in.

  • Computacenter - Infoblox BloxOne Threat Défense

    Computacenter (UK) Ltd

    Infoblox BloxOne Threat Defense Advanced, a comprehensive DNS Detection and Response (DNSDR) solution, detects threats and stops attacks by hunted/pre-campaign/DNS threat intelligence. Intelligent ecosystem integration/automation/AI-driven analytics to reduce MTTR, improve ROI of security tools, and SecOps efficiency. Lookalike Domain Monitoring/Takedown services enable businesses to efficiently protect their brand and customers.

  • Tessian ICES Email - Proofpoint copy

    BROOKCOURT SOLUTIONS LIMITED

    Proofpoint's Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • Computacenter - CrowdStrike Falcon Insight Extended Detection & Response (XDR)

    Computacenter (UK) Ltd

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • UK Identity, Right to Work (RTW), and Criminal Record Checking (DBS) Services

    VERIFILE LIMITED

    UK Criminal Record Check (DBS, Disclosure Scotland, PVG, AccessNI) services, UK Right to Work Checks, and Identity Verification. Verifile's secure platform enables employers to select UK and International background check services. Integration with the DBS Disclosure and Barring Service and Disclosure Scotland ensures fastest turnarounds for UK criminal record checks.

  • Bitdefender Gravityzone - Next-Gen Endpoint Antivirus

    Network Utilities (Systems) Ltd

    Bitdefender GravityZone Enterprise is a cybersecurity solution for organisations, offering advanced threat protection and endpoint security for devices like servers, desktops, and mobile devices. It combines anti-malware, anti-ransomware, and Endpoint Detection and Response (EDR) capabilities to defend against various cyber threats.

  • Fingerprint Identification

    VIABLE DATA LTD

    Experts in biometrics and security controls, Viable Data offer fingerprint identification services that can be used alone or as part of Multi-Biometric Factor Authentication. Due to its accuracy and reliability, fingerprint identification is suitable for law enforcement, immigration and border control, and access control settings.

  • SharePoint Intranet Development and Enterprise (Data, Content & Document) Management Services

    VE3 GLOBAL LTD

    We specialize in creating Intranet, Data, Content, and Document Management solutions utilizing both standard and customized functionalities of SharePoint 2013, SharePoint 2016, SharePoint 2019, and Online/O365 editions. Our Intranet solutions offer centralized communication and collaboration services, encompassing a comprehensive range of modern and classic SharePoint features.

  • AI Anomaly Cyber Security and Monitoring Behavioural Analytics

    adappt

    Defend against insider threat and cyber theft. Uses Deep Learning insights for business transformation. Improve your employee efficiency and increase your bottom line. Complex activity based Neural Networks are capable of rooting out unusual/intrusive behaviour.

  • Ethical Phishing Campaign

    VISIONIST LIMITED

    Targeted ethical phishing campaign tailored to your requirements to improve organisational resilience against phishing attacks. Cloud-based service proven to be highly effective at combatting email-borne cyber threats. Comprehensive reporting will demonstrate your improved cyber security awareness. Delivers a high return on investment (ROI) from the targeted campaign.

  • Amazon WorkMail

    SOFTCAT PLC

    Amazon WorkMail is a secure, managed business email and calendar service with support for existing desktop and mobile email client applications. Amazon WorkMail gives users the ability to seamlessly access their email, contacts, and calendars using the client application of their choice.

  • iboss Zero Trust Edge

    Bright Cyber (Voodoo technology LTD)

    The iboss Zero Trust platform utilises a containerised cloud architecture to enable easy migration from legacy appliances, whilst maintaining 100% dedicated IP address space in the cloud. This allows for PDNS intergration, and admin created GDPR Zones with dedicated UK datacentres. Packages include Filtering, Malware detection and Data Loss Prevention

  • Barracuda Email Protection

    Central Networks and Technologies Ltd

    Barracuda Email Protection provides the most comprehensive protection against all 13 email threat types, from spam and ransomware to socially engineered threats such as spear phishing, business email compromise, and account takeover.

  • Forcepoint Cloud Access Security Broker (CASB)

    SAPPHIRE TECHNOLOGIES LIMITED

    Forcepoint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and. Information assurance restrictions on using the Cloud.

  • Konsolute ISO Certified Quality Management System (QMS)

    KONSOLUTE

    Implement a robust ISO Certified Quality Management System (QMS) with our solution tailored for Microsoft 365. Manage, track, and audit your organisation's compliance and standards efficiently, enhancing quality management practices across your business operations.

  • Akamai Trafficpeak

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Neo Technology Data Strategy and Maturity Assessment Service

    NEO TECHNOLOGY LIMITED

    Neo Technology's Data Strategy and Maturity Assessment (DMA) Service outlines a strategic approach to leverage information assets in line with organisational goals. Conducted through DAMA or Central Digital & Data Office (CDDO), the DMA evaluates current capabilities and provides actionable insights. A roadmap guides improvements in governance, architecture, BI, MDM.

  • Palo Alto Cortex XDR

    BYTES SOFTWARE SERVICES LIMITED

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency. bssgc

  • MTI Delinea Secret Server Cloud Privilege Access Management & Privilege Manager

    MTI TECHNOLOGY LIMITED

    Delinea Secret Server Cloud is an online password manager hosted in Azure, a highly secure and available platform. Secret Server has layers of built-in security with easy access management for IT admins, robust segregation of role based duties, AES 256 bit encryption, 60+ out-of-the box reports to demonstrate compliance.

  • Barracuda SecureEdge (SASE)

    PRIMESYS LTD

    Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, anytime, anywhere, providing security inspection and policy enforcement in the cloud, at branch, or on device. Barracuda SecureEdge delivers enterprise-grade security including Zero Trust Network Access (ZTNA), Firewall-as-a-Service, web security, fully-integrated office connectivity with Secure SD-WAN.

  • PSAT Security Awareness Training - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • CyberCyte EAR

    Grove Information Systems

    CyberCyte EAR is a Blue Team Platform for discovering and responding to threats and risks more accurately by creating a consolidated analysis framework integrating asset, threat, hardening baseline, and vulnerability information.

  • Informu Information Asset Register and Management System

    INFORMU SOLUTIONS LIMITED

    The Informu Information Asset Register / Management system stores asset data gathered during an information / system audit, as well as managing your Records of Processing Activities. It also stores your records retention policies, to which assets are tagged. You can keep an audit trail of actions related to assets.

  • Wiz

    SOFTCAT PLC

    Wiz is a CNAPP security platform that helps customers protect everything they build and run in the cloud, providing full-stack agentless cross-cloud support for AWS, Azure, GCP, OCI and Kubernetes. Providing Wiz Code, Wiz Sensor and Wiz Premium Support

  • Evolve Security Automation

    2T SECURITY LTD

    Evolve delivers on-demand specialist security capabilities that augment your teams, build security capabilities into your business, and maximize security budgets delivering greater coverage and improved security posture of your business. This removes the need to hire additional employees, enabling your existing team to focus their time on strategic security activities.

  • Netwrix Recover for Active Directory

    INTEGRITY360 LIMITED

    Netwrix Recovery for ActiveDirectory helps organizations avoid security breaches and business disruptions by enabling administrators to quickly revert entire AD objects or just a single attribute to a known good state, without downtime. This comprehensive solution handles AD objects, attributes, group memberships, DNS entries, Group Policy objects (GPOs), and more

  • Barrier Networks Secure Data Workflow (OPSWAT MetaDefender)

    Barrier Networks

    MetaDefender is used by organizations that require the highest level of security, including critical infrastructure, government agencies, and financial institutions, to enable a secure way to get files in and out of an organization, and prevent cyber security threats.

  • Recycling of ICT, Telecomms & Cable to WEEE and EA Regulation Standards

    Network 2 Supplies Ltd

    N2S are the leaders in pursuit of zero waste technology, delivering a disposal service that consistently returns technology waste to maximum re-use. We can offer secure collection bins for use in data centre environments. These are then transported to N2S where the data is cleansed and the drives destroyed.

  • CDW Check Point Harmony SASE

    CDW LIMITED

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.