Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • iProov Authentication Solution

    IPROOV LIMITED

    iProov Authentication delivers secure and convenient citizen and workforce authentication leveraging face, fingerprint, and/or palm biometrics. Cloud-based biometrics linked to a trusted identity allows individuals to smoothly authenticate across the entire identity lifecycle, from Account Login and Recovery to Device Binding and Step-up Authentication.

  • SentinelOne Endpoint Security Platform

    CYBANETIX LIMITED

    SentinelOne Endpoint Protection unifies prevention, detection, and response in a single purpose-built agent powered by machine learning and automation. It provides prevention and detection of attacks across all major vectors, rapid elimination of threats with automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics.

  • Long Arm® Platform with Secure Misattribution and Associated Services

    INTERNET INVESTIGATION SOLUTIONS LTD

    Long Arm®, is a platform for secure online investigation, open source research, and evidential capture. Our fully audited platform empowers investigators to operate on the internet with a managed digital footprint, and to capture and produce content to an evidential standard. Our Collaboraite® capability enables data & AI exploitation.

  • Tenable Cloud Security (earlier version named Tenable.cs)

    SOFTCAT PLC

    See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.

  • Sophos Intercept X Advanced with XDR

    Chess CyberSecurity Ltd t/a CyberLab

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Exchange Online Protection

    VE3 GLOBAL LTD

    Exchange Online Protection safeguards your cloud-based or on-premises email with anti-spam and anti-malware protection. It offers financially backed SLAs and guarantees 99.999% network uptime, effectively shielding against 100% of known viruses and 99% of spam. Additionally, it provides reporting and message trace capabilities along with policy-based filtering.

  • Email Authentication Platform, incorporating SPF, DKIM, DMARC, BIMI, MTA-STS & TLS-RPT.

    Infosec Ventures

    EmailAuthentication-as-a-Service platform enables Brand Protection, Anti-Spoofing, Anti-Phishing, enhances email deliverability and provides full visibility of email as a channel. It uses SPF, DKIM, BIMI and DMARC. DMARC is part of the Active Cyber Defence Program. We provide Security Awareness & Training alongwith EmailRemediation to mitigate risk at the Human Layer.

  • PowerConnect for SAP solution and Splunk

    SOMERFORD ASSOCIATES LIMITED

    PowerConnect is certified SAP add-on which can extract high-fidelity, real-time and historical SAP telemetry data ready for analysis and visualisation in Splunk.

  • Forcepoint Insider Threat (FIT)

    Chess CyberSecurity Ltd t/a CyberLab

    Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 15 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.

  • Computacenter - Proofpoint Security Awareness Training

    COMPUTACENTER (UK) LIMITED

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • Vehicle fleet and resource management system

    LIGHTBULB ANALYTICS LIMITED

    Lightbulb Analytics [LBA] IR3 system is a fleet and resource management system which enables users to optimise their fleet and resources. IR3 achieves this by providing features such as live tracking, vehicle status, trip replay, driver behaviour, vehicle and personnel utilisation and potential collision analysis.

  • Social Engineering - Simulated Phishing Testing

    LEIDOS INNOVATIONS UK LTD

    Leidos provides simulated phishing attacks to provide security awareness training and a greater understanding of how an organisation’s users respond to different types of suspicious mails/webpages/SMS/phone calls. We also provide an independent benchmark of the effectiveness of your security awareness campaigns, defences and prioritised remediation recommendations.

  • Tanium Converged End Point Management (XEM)

    PHOENIX SOFTWARE LIMITED

    Visibility, control, remediation of endpoints in real-time, cloud-scale and autonomous - Tanium offers the only converged endpoint management (XEM) platform that combines end-to-end visibility, control, and remediation in one place.

  • Kentico support

    SPINDOGS LTD

    Kentico support. Mobile optimised, accessible website development. Spindogs' Kentico CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.

  • boxxe Cloudflare Cloud Email Security

    BOXXE LIMITED

    Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.

  • CDW Sophos Intercept X Advanced with XDR

    CDW LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Proofpoint DLP Transform Package

    INTEGRITY360 LIMITED

    Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.

  • Sentinel Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    We offer comprehensive breach detection and response, powered by Microsoft Sentinel, delivered by our 24/7 UK-based Security Operations Centre. Our service uses cloud-native SIEM and SOAR capabilities for rapid detection, investigation, and response to threats across cloud, hybrid, and on-premises environments, supported by expert analysts and automation.

  • Palo Alto Cortex XSOAR

    SOFTCAT PLC

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • Powered by Neo: Offline Functionalities and Mobile App

    NEO TECHNOLOGY LIMITED

    Empower staff and residents with offline functionalities and a mobile app powered by Neo Technology. Access essential features, submit requests, and receive alerts seamlessly, even without an internet connection. Improve convenience, engagement, and operational efficiency with this innovative solution.

  • CrowdStrike Falcon Insight Extended Detection & Response (XDR)

    SOFTCAT PLC

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Sophos Firewall

    CHESS ICT LIMITED

    Sophos XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Computacenter - Proofpoint Core P0

    COMPUTACENTER (UK) LIMITED

    Combat email threats comprehensively with end-to-end solutions, spanning detection to response. Automate abuse mailbox handling to swiftly eliminate user-flagged phishing emails. Tackle diverse threats like phishing, BEC, supplier fraud, ransomware, and malware. Enhance visibility into attack targets, methods, user responses, and compromises for proactive defense strategies.

  • Proofpoint P1 Bundle

    BYTES SOFTWARE SERVICES LIMITED

    Train end users to be more resilient against threats they receive. Augment threat protection with a robust security awareness training programme that integrates with your email security controls and includes phishing simulations, cultural and knowledge assessments, comprehensive training and awareness materials. bssgc

  • Cloudflare Zero Trust Network Access (ZTNA)

    Cloudflare, Inc.

    Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.

  • Rapid7 - Insight AppSec

    SOFTCAT PLC

    InsightAppSec part of Rapid7's security suite, providing Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are getting complex, utilizing JavaScript frameworks, like React and Angular, that provide a richer experience and easier path to full feature sets, but also present challenges to secure those apps.

  • NAZAR X Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    Detecting and Preventing breaches. XDR / MDR / SIEM / SOC. Monitoring and detection as a fully managed Service

  • CheckPoint Harmony Endpoint

    SOFTCAT PLC

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Kentico web content management system

    SPINDOGS LTD

    Kentico web content management system. Mobile optimised, accessible development. Spindogs' Kentico CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.

  • CDW AvePoint Policies for Microsoft 365

    CDW LIMITED

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.