Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1741 results found

1741 results found in Lot 2: Cloud software in the category Security risk management

  • Cribl Stream, Edge, Search and Lake

    NETWORKOLOGY LTD

    The Cribl suite enable customers to collect, reduce, enrich, normalise, and route data from any source to any destination; search across multiple sources; and store data in a self-provided or vendor supplied data-lake. Take control of your data and empower your organisation with make data-driven decisions with tangible business outcomes.

  • Netwrix Data Classification

    BYTES SOFTWARE SERVICES LIMITED

    Netwrix Data Classification solves your data-related challenges, such as mitigating the risk of data breaches, realizing the full value of your content, increasing employee productivity and passing compliance audits with less effort. bssgc

  • Mimecast Comprehensive Defence Plan (Zone 1+2)

    INTEGRITY360 LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Health & Safety DSE Software

    Cardinus Risk Management Limited

    Cardinus provide on line risk assessment and e-learning solutions for Health & Safety training DSE Ergonomics DSE Assessor Laboratory Ergonomics Driving Fire Manual Handling Stress Lone-working Travel Induction Bribery Return to Work Safety for Line Managers Data Protection Security Environmental Essentials Driver Training Online Homeworking Hybrid

  • HumanFirewall®: Human Risk Management, Security Awareness Training & Phishing Simulation platform

    Infosec Ventures

    HumanFirewall transforms employees from an organisation's weakest link into their greatest asset in cybersecurity. The platform delivers individualised training, does machine learning enabled behavioural profiling, gamifies and rewards real-time reporting, remediates real attack incidents in seconds (down from hours) and becomes a 'virtual security analyst' assisting humans 24X7.

  • Conceal Web Security

    Grove Information Systems

    ConcealBrowse elevates web security to new heights, harnessing the power of advanced AI to seamlessly detect, thwart, and shield users from the constantly evolving spectrum of web-based threats.

  • COMET

    STC INSISO LTD

    COMET is a configurable set of intelligent data-driven tools supported by domain expertise for incident management, investigation, root cause analysis, audit, and supply chain assurance. A consistent and structured approach, 
with integration to EHS systems, and with AI enhancements to give you real risk intelligence to see the previously unseen.

  • IBM API Connect On Cloud Reserved Instance (Dedicated)

    IBM UNITED KINGDOM LIMITED

    IBM API Management solution provides organisations with the tools to Create, Run, Manage, Secure and Analyse APIs with complete lifecycle management for enterprise grade workloads. An award-winning API Portal for developers from B2B/B2C enables easy API onboarding and fantastic consumer experience. Advanced analytics provide insights to better manage APIs.

  • Micro Focus, now OpenText - Debricked on SaaS

    MICRO FOCUS

    Debricked is a remotely delivered, cloud-based Open-Source Project Health and Intake solution aimed at helping enterprises and developers find the right Open Source for their needs and constraints early in the SDLC. It provides project data and functionality to search, compare and assess any Open-Source project based on SCA policies.

  • Hosted Teams Voice Service

    Advania

    Advania have a proprietary fully hosted, fully managed, globally hosted, UC platform, HALO, that provides Teams Direct Routing and Operator Connect services. This Highly Available, Latency-Optimised infrastructure enables our customers to remain agile and deploy new services at speed whilst ensuring that all resilience, regulatory and compliance needs are met.

  • Mimecast Comprehensive Defense Plan (Zone 1+2)

    CHESS ICT LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Claroty Medigate

    INTEGRITY360 LIMITED

    The Medigate Platform is the industry’s leading healthcare cyber-physical systems protection platform that enables healthcare organisations to safely deliver connected care while enhancing efficiencies across the clinical environment. The Medigate Platform spans the entire healthcare cybersecurity journey regardless of the scale or maturity of your environment through:

  • CheckPoint CloudGuard Web Application Firewall (WAF)

    BYTES SOFTWARE SERVICES LIMITED

    Check Point CloudGuard WAF provides Web Application and API protection. With deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security. bssgc

  • Palo Alto Prisma Cloud

    XPERTEX LTD

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.

  • Tenable.io Vulnerability Management

    Redinet Ltd

    Managed in the cloud and powered by Tenable Nessus, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your organization. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and proactively prioritize remediations.

  • ICT Relocation - Data Centre

    Network 2 Supplies Ltd

    Relocating Cloud IT can be complicated. We will audit the physical hardware and provide a comprehensive inventory. We will provide assurance that all items are transported following being safely packed, in one of our fleet of tracked vehicles.

  • Zero Trust

    Differentia Consulting

    Provision of simple secure networking everywhere. Underpinned by Zero Trust. With our service you can spin up your network in minutes, combining networking and security across all of your use cases. Managing the Fabric as a service while you control it. All functionality is accessible via hosted service or API.

  • BigFix Endpoint Management & Security

    INTEC SYSTEMS LIMITED

    HCL BigFix software enables IT operations to maintain compliance of all servers, desktops and mobile devices. BigFix can automate and manage the deployment of software across all devices.

  • Check Point Harmony SASE

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • Delinea - Privilege Manager (Zero Trust & PEDM)

    Barrier Networks

    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.

  • Computacenter - CrowdStrike Falcon Cloud Security

    Computacenter (UK) Ltd

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • Policy Management

    TMC3 LIMITED

    OneTrust Enterprise Policy Management modernises policy management for public sector entities, enabling centralised control, streamlined workflows, and robust compliance tracking. Facilitate effective policy lifecycle management, attestation processes, and compliance visibility, ensuring operational consistency and regulatory adherence.

  • Trustmarque Varonis SaaS Data Security Platform

    TRUSTMARQUE SOLUTIONS LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • CloudCover Guardian for Azure

    PHOENIX SOFTWARE LIMITED

    An established Microsoft 365 estate has over 250 configurable items governing how Microsoft 365 is used within an organisation. CloudCover Guardian for Azure enables you to capture and protect these configurations and pro-actively manage your Microsoft 365 environment. Includes protection for SharePoint, Teams, OneDrive, Exchange and Entra ID (Azure AD).

  • Island - Enterprise Browser / Secure Browser

    SOMERFORD ASSOCIATES LIMITED

    Island is an Enterprise Browser that provides policy control over every facet of a user’s interaction with a web application giving you limitless visibility, control and compliance with your most critical applications. Island can serve as the platform for the future of productive and secured work.

  • Barrier Networks Menlo Cloud Secure Browser Platform and Remote Browser Isolation (RBI)

    Barrier Networks

    The Menlo Cloud Secure Browser Platform eliminates the possibility of malware reaching user devices via compromised or malicious websites or documents, or via phishing and credential harvesting attacks with a 100% effectiveness warranty.

  • Microsoft 365 (M365) Licenses - CoreGov

    CORE TECHNOLOGY SYSTEMS (U.K.) LIMITED

    Cloud Office Productivity includes Office ProPlus Word, Excel, PowerPoint, OneNote, co-authoring, Outlook Exchange Email, Teams, Instant Messaging, voicemail, video dial-in conferencing, SharePoint collaboration and team sites, OneDrive, Yammer, enterprise social networking, Encryption, Data Loss Protection, Rights Management. Mobile (iOS, Android, Windows phone), desktop (Windows, Mac). See https://products.office.com/en-gb/secure-productive-enterprise

  • Sophos Cloud Optix

    CHESS ICT LIMITED

    Sophos Cloud Optix, the Sophos Cloud Security Posture Management solution, proactively reduces business risk from unsanctioned activity, vulnerabilities, and misconfigurations across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform public cloud environments.

  • Brand protection

    SAPPHIRE TECHNOLOGIES LIMITED

    Brand impersonation is on the rise. Many British citizens are unaware that .gov.uk is the domain for public sector organisations. This service monitors and provides critical information about brand-related cyber threats, including organisation and brand impersonations, logo and domain abuse, leaked data and credentials. A takedown service is also available.

  • Barrier Networks Centri for Endpoint Protection, Detection and Response (EDR)

    Barrier Networks

    We have selected industry leading, next generation endpoint solutions that combine traditional endpoint protection with endpoint detection and user behavior analysis. This allows us to configure use cases aligned to your business whether you are concerned with compromised devices, malicious users or negligent users.