Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Identity and Access Management (IAM) Advanced

    SAPPHIRE TECHNOLOGIES LIMITED

    An Identity and Access Management (IAM) system is designed to be a single solution for managing user access and permissions within an organisation’s environment. Covering solutions for Privileged Account and Session Management (PASM), Privilege elevation and delegation management (PEDM), Secrets Management and Cloud Infrastructure entitlement management (CIEM).

  • Wordpress consultancy

    SPINDOGS LTD

    Consultancy for mobile optimised, accessible Wordpress CMS websites. Spindogs' Wordpress CMS platform provides bespoke templates for content editors. GDPR compliant Wordpress CMS has an easy to use admin interface and flexible content editing features. Wordpress content management system is open-source, user friendly, and fully customisable.

  • Multi-Agency Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empower users to have complete control of managing multi-agency working. Secure, scalable, with UK GDPR and DPA Pt3 customer special terms. Hosted in UK it offers quick and flexible deployment with no upfront costs. Full multi-agency working technology platform providingg full UK data sovereignty for efficient, sustainable, and legal operations.

  • Tenable One - Standard

    SOFTCAT PLC

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance. Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory"

  • Cloudlake Backup for M365

    AUTODATA PRODUCTS LIMITED

    Cloudlake Backup for M365 (powered by Veeam) protects organisations from undetected deletions, corruption and both internal and external threats. Our unique model allows you to protect Exchange, Teams, Sharepoint and OneDrive for Business against any event, whilst ensuring you only purchase exactly what you need with no wasted expense.

  • Check Point Harmony Endpoint

    CHARTERHOUSE VOICE & DATA LIMITED

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Cyber Resilience Training Platform (SaaS)

    CYBEXER (UK) LTD

    The Cyber Resilience Training Platform (SaaS) delivers a cloud-based solution for organizations to practice cyber resilience. It provides scalable, realistic simulations tailored to business and public sector cyber threats, emphasizing response and recovery to ensure organizations can withstand and quickly rebound from cyber incidents.

  • boxxe Sophos Managed Detection and Response Complete (MDR) Endpoint

    BOXXE LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications

  • Check Point Harmony Mobile

    CHARTERHOUSE VOICE & DATA LIMITED

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • Vulnerability Assessment and Intelligence Services as a service (VAaaS)

    PROACT IT UK LIMITED

    Proact’s Vulnerability Assessment as a Service (VAaaS) provides a vulnerability analysis service that enhances traditional options with specialist security analysis, advice and remediation recommendations, and robust ITIL ® based support and service management processes. Proact's security specialists will advise and remediation options threat landscape and enterprise security best practices.

  • Web,Mobile Design and IT Support Services

    DBAAS LTD

    We provide the cost effective solutions with the migration of existing system&technological upgrade with a fresh UI for better look & feel. Technologies that we serve RESTful Web Services,Angular, Node JS, HapiJs, Laravel, Codeigniter,Python.Technologies that we serve @ DBaaS Native Applications - Android, iOS & Hybrid Applications - Ionic, Flutter.

  • CDW CrowdStrike Application Security Posture Management

    CDW LIMITED

    CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • Armour Bridge - Secure Messaging Gateway

    ARMOUR COMMUNICATIONS LIMITED

    Armour Bridge provides secure controlled access between Armour Mobile and third party Instant Messaging (IM) / chat applications. It supports cross domain interoperability and can use popular open-source capabilities like Matrix to exchange messages with consumer apps like Signal or WhatsApp.

  • CheckPoint Harmony Email & Collaboration

    BYTES SOFTWARE SERVICES LIMITED

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss. bssgc

  • Office 365 Exchange Advanced Threat Protection

    VE3 GLOBAL LTD

    VE3's email protection defends against sophisticated threats in real-time, with automated analysis and detonation of suspicious content and URLs. Gain insights into targeted individuals and attack categories, with features for investigating blocked messages and tracing URLs, ensuring proactive cybersecurity measures.

  • Tenable Active Directory Security

    PHOENIX SOFTWARE LIMITED

    Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.

  • Proact Security Log Management Service (Microsoft Sentinel)

    PROACT IT UK LIMITED

    Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).

  • Sentinel Spaces

    YUDU Sentinel

    Sentinel Spaces is a new major Incident management platform that allows Spaces to be prepared for specific threats, ready for activation. Crisis teams at multi-site locations can run local incidents with central oversight. Tools include, mass notification, secure chat, conferencing, document distribution, task management, decision and audit logs.

  • Neo Technology Digital Document Management Solution

    NEO TECHNOLOGY LIMITED

    Neo Technology's Digital Document Management Solution offers a scalable, browser-based platform for efficiently and securely managing document and data lifecycles. Through robust automation and workflow capabilities, it optimises core service delivery by reducing administrative burdens, automating processes, and facilitating seamless integration, ultimately enhancing agility and delivering cost savings and efficiencies.

  • Sophos Central Intercept X Advanced with XDR

    BYTES SOFTWARE SERVICES LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visibility across other 3rd party security vendors. bssgc

  • Forescout NetSec Core

    CHESS ICT LIMITED

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assets.

  • Forcepoint Data Guard

    CHESS ICT LIMITED

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • CDW CyberArk Conjur Secrets Manager Enterprise

    CDW LIMITED

    Control, manage and audit non-human privileged access for applications, including commercial off-the-shelf, in-house developed applications and applications developed using DevOps tools and methodologies -- across on premises, hybrid, cloud and containerized environments.

  • AvePoint Cloud Backup

    SOFTCAT PLC

    Immutable, Air-Gapped Cloud to Cloud Backups for Microsoft 365, Dynamics 365, Microsoft Azure, Microsoft Power Platform, Microsoft Entra, Salesforce and Google Workspace

  • Tenable Identity Exposure (formerly Tenable.ad)

    SOFTCAT PLC

    Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.

  • Trustmarque Palo Alto Cortex XDR

    TRUSTMARQUE SOLUTIONS LIMITED

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivalled security and operational efficiency.

  • KnowBe4 - Email Phishing and Security Awareness Training

    SOMERFORD ASSOCIATES LIMITED

    KnowBe4 empowers your workforce to make smarter security decisions every day. Over 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk. KnowBe4 builds a human layer of defence so organisations can fortify user behaviour with new-school security awareness and compliance training.

  • Occamsec InCenter Penetration Testing, Threat Hunting Platform.

    BARRIER NETWORKS LIMITED

    Incenter SaaS platform : continuous penetration-testing, automation and human testers, continually test for vulnerabilities in applications, infrastructure and software. Penetration-Testing: Ethical hacker team providing penetration testing to find vulnerabilities and risk. Threat Hunting: Consulting looking for IOC within organisation. "Teaming": Assessing attack vectors (Red), Defensive team (Blue) and mix (Purple)

  • Proofpoint Advanced Package

    INTEGRITY360 LIMITED

    Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.

  • Konsolute Kolumbus - Data Discovery Tool

    KONSOLUTE LTD

    Enhance your data analysis and discovery with Konsolute Kolumbus, a powerful tool designed for discovering, visualising, and analysing organisational data. Kolumbus simplifies understanding large datasets, supports compliance, and aids in effective data migration by identifying key data elements and structuring them through intelligent taxonomy creation.