Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1698 results found

1698 results found in Lot 2: Cloud software in the category Security risk management

  • Computacenter - CrowdStrike Falcon Cloud Security

    COMPUTACENTER (UK) LIMITED

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • Policy Management

    TMC3 LIMITED

    OneTrust Enterprise Policy Management modernises policy management for public sector entities, enabling centralised control, streamlined workflows, and robust compliance tracking. Facilitate effective policy lifecycle management, attestation processes, and compliance visibility, ensuring operational consistency and regulatory adherence.

  • Trustmarque Varonis SaaS Data Security Platform

    TRUSTMARQUE SOLUTIONS LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • CloudCover Guardian for Azure

    PHOENIX SOFTWARE LIMITED

    An established Microsoft 365 estate has over 250 configurable items governing how Microsoft 365 is used within an organisation. CloudCover Guardian for Azure enables you to capture and protect these configurations and pro-actively manage your Microsoft 365 environment. Includes protection for SharePoint, Teams, OneDrive, Exchange and Entra ID (Azure AD).

  • Island - Enterprise Browser / Secure Browser

    SOMERFORD ASSOCIATES LIMITED

    Island is an Enterprise Browser that provides policy control over every facet of a user’s interaction with a web application giving you limitless visibility, control and compliance with your most critical applications. Island can serve as the platform for the future of productive and secured work.

  • Barrier Networks Menlo Cloud Secure Browser Platform and Remote Browser Isolation (RBI)

    BARRIER NETWORKS LIMITED

    The Menlo Cloud Secure Browser Platform eliminates the possibility of malware reaching user devices via compromised or malicious websites or documents, or via phishing and credential harvesting attacks with a 100% effectiveness warranty.

  • Microsoft 365 (M365) Licenses - CoreGov

    CORE TECHNOLOGY SYSTEMS (U.K.) LIMITED

    Cloud Office Productivity includes Office ProPlus Word, Excel, PowerPoint, OneNote, co-authoring, Outlook Exchange Email, Teams, Instant Messaging, voicemail, video dial-in conferencing, SharePoint collaboration and team sites, OneDrive, Yammer, enterprise social networking, Encryption, Data Loss Protection, Rights Management. Mobile (iOS, Android, Windows phone), desktop (Windows, Mac). See https://products.office.com/en-gb/secure-productive-enterprise

  • Sophos Cloud Optix

    CHESS ICT LIMITED

    Sophos Cloud Optix, the Sophos Cloud Security Posture Management solution, proactively reduces business risk from unsanctioned activity, vulnerabilities, and misconfigurations across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform public cloud environments.

  • Brand protection

    SAPPHIRE TECHNOLOGIES LIMITED

    Brand impersonation is on the rise. Many British citizens are unaware that .gov.uk is the domain for public sector organisations. This service monitors and provides critical information about brand-related cyber threats, including organisation and brand impersonations, logo and domain abuse, leaked data and credentials. A takedown service is also available.

  • Barrier Networks Centri for Endpoint Protection, Detection and Response (EDR)

    BARRIER NETWORKS LIMITED

    We have selected industry leading, next generation endpoint solutions that combine traditional endpoint protection with endpoint detection and user behavior analysis. This allows us to configure use cases aligned to your business whether you are concerned with compromised devices, malicious users or negligent users.

  • boxxe Sophos Cloud Optix

    BOXXE LIMITED

    Sophos Cloud Optix, the Sophos Cloud Security Posture Management solution, proactively reduces business risk from unsanctioned activity, vulnerabilities, and misconfigurations across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform public cloud environments.

  • CrowdStrike Falcon Endpoint Detection & Response (EDR)

    SOFTCAT PLC

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Akamai Queue-it

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • BigFix - Endpoint Management for any device: Desktop to Server to Cloud to Mobile

    HCL TECHNOLOGIES UK LIMITED

    BigFix-Endpoint Management: -IT Asset Discovery/Reporting -Patch Management/Remediation -Software Distribution -Self-Service Catalogue -Remote Control -Operating System (OS) deployment and image management -Compliance/vulnerability management -License usage/contract management -Advanced reporting + third party vulnerability tool integration -ServiceNow bi-directional integration -iOS, Android enrolment and policy management -Win10/Win11 + MacOS enrolment and policy management.

  • CDW OneTrust Governance, Risk, Compliance Technology

    CDW LIMITED

    Ensuring data quality, usability, and integrity are key factors in building trust in your organization. Strengthen your data stewardship by driving business value and complying with the latest privacy regulations and security frameworks, all within one unified platform.

  • Wonde Data Recovery

    EVOUCHERS LTD

    A disaster recovery solution which automatically syncs school data throughout the school day. Should you experience a cyber incident, Wonde has your data protected and readily accessible for continuity. Data Recovery keeps your selected data protected, accessible, and up to date so you can keep your school open and running.

  • Phishing Tackle Security Awareness Training, Simulated Phishing & Policy Management

    Phishing Tackle Limited

    UK's leading Security Awareness & Training provider. British multilingual automated training and testing platform, policy management, PhishNet S.O.A.R. tool, and Microsoft Teams Integration. Granular reporting including high risk users, breach data, and training completion statistics. Encompassing a fully managed service saving you time, budget and quickly reducing user risk.

  • Heimdal Security - Next-Gen Endpoint Antivirus

    NETWORK UTILITIES (SYSTEMS) LIMITED

    Combining the techniques known by both traditional and next-gen antivirus engines, Heimdal™ Next-Gen Endpoint Antivirus is the endpoint detection and response tool that will become the the backbone of your enterprise. Cyber threats are no longer the activity of rogue hackers.

  • Tenable Lumin

    PHOENIX SOFTWARE LIMITED

    Calculate, communicate and compare your cyber risk.

  • Devo (Cloud Native Logging & Security Analytics)

    2T SECURITY LTD

    Devo is a cloud-native logging and security analytics platform that releases the potential of your data to empower bold, confident action when it matters most. The Devo platform delivers real-time visibility, high-performance analytics, scalability, multitenancy, and low TCO for monitoring and securing business operations as enterprises migrate to the cloud.

  • SafeSend - Recipient Verification software

    FuseMail

    Microsoft Outlook add-in used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the user to confirm external recipients and file attachments before an email can be sent. Our module further scans attachments and email content for particularly sensitive data, allowing companies to build additional custom DLP rules.

  • CDW Check Point Harmony SaaS

    CDW LIMITED

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.

  • NHS Custom Solutions

    DBAX LTD

    We provide bespoke software tailored for the NHS, solving business challenges through digital solutions. We leverage open-source technology and adhere to stringent security rules. Our cloud-based applications integrate seamlessly with NHS systems and offer advanced features like machine learning, supported by a team with extensive NHS experience.

  • ControlPlane Enterprise for Flux CD

    CONTROL PLANE LIMITED

    CPE-Flux is a subscription-based offering designed to meet the stringent requirements of highly regulated organisations running production cloud native environments. CPE-Flux Continuous Delivery provides a secure, stable, and efficient solution for cloud native enterprises to depend on with confidence.

  • Tenable Vulnerability Management (formerly Tenable.io)

    PHOENIX SOFTWARE LIMITED

    Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.

  • Aiimi Insight Engine – Digital Applications

    AIIMI LIMITED

    Insight Engine is our unique discovery platform. It works alongside you, using artificial intelligence to swiftly and securely serve you relevant information and insight. Bring enterprise search and insights to your low-code and no-code platforms with Aiimi Insight Engine for Digital Applications. Sample applications and APIs, widgets and technical support.

  • Data Protection Compliance Platform

    TMC3 LIMITED

    The OneTrust platform enables organisations to centrally manage and track data protection compliance activities. Enforce the governance of data protection policies and procedures across the organisation’s data landscape. The platform helps to remove the reliance on manual processes and the burden on under resourced teams with effective automation and integrations.

  • CheckPoint - Quantum Smart-1 Cloud

    VE3 GLOBAL LTD

    VE3's Check Point Smart-1 Cloud offers cloud-delivered security management, providing policy management for on-premises and IaaS security gateways, along with security event analytics and reporting via a user-friendly web-based SmartConsole.

  • boxxe Tenable Identity Exposure

    BOXXE LIMITED

    Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.

  • Cyber Resilience Training Platform (Hybrid)

    CYBEXER (UK) LTD

    The Cyber Resilience Training Platform (SaaS) delivers a cloud-based solution for organizations to practice cyber resilience. It provides scalable, realistic simulations tailored to business and public sector cyber threats, emphasizing response and recovery to ensure organizations can withstand and quickly rebound from cyber incidents.