Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • ESET Protect Complete

    INTEGRITY360 LIMITED

    Our combination of spam filtering, anti malware scanning, anti phishing and cloud sandboxing helps protect your organization against infections and targeted attacks, as well as blocking new, never-before-seen types of threats, especially ransomware.

  • CheckPoint CloudGuard Network Security - For Azure Virtual WAN

    SOFTCAT PLC

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.

  • Mimecast Cybergraph

    Chess CyberSecurity Ltd t/a CyberLab

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • Netapp - Cloud Data Sense

    SOFTCAT PLC

    Cloud Data Sense is a data mapping and classification tool, across your hybrid cloud and on-premise environment. Driven by our powerful AI algorithms, we provide automated controls and reporting so that you can always stay on top of your data

  • Sophos Network Detection and Response

    SOFTCAT PLC

    Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • CrowdStrike Falcon Exposure Management

    INTEGRITY360 LIMITED

    CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Mimecast Cybergraph

    INTEGRITY360 LIMITED

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • Log Management ( FortiAnalzyer)

    FULLPROXY LIMITED

    FortiAnalyzer is a centralized logging, analytics, and reporting appliance. It's designed to provide organizations with comprehensive visibility into their network security infrastructure. It collects, analyzes, and correlates log data from Fortinet security devices, including firewalls, switches, access points, and more, to help organizations monitor and manage their security posture effectively.

  • Netwrix Auditor

    INTEGRITY360 LIMITED

    Detect security threats, prove compliance and increase IT team efficiency with IT audit software from Netwrix

  • Application Security Services

    SALUS DIGITAL SECURITY LIMITED

    Gathering independent assurance of cloud service provision and operation against legal, Government, and Industry standards

  • Call Centre Case Management

    CLARITAS SOLUTIONS LIMITED

    Empowers users to have complete control of your customers journey. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Sophos Central Email Advanced

    BYTES SOFTWARE SERVICES LIMITED

    Sophos Email is a cloud-based secure email gateway solution built to integrate seamlessly with popular email platforms (Exchange Online, Google Suite etc..). Sophos Email is engineered to keep businesses safe from email threats such as Malware, Zero Day, Phishing, Spam while also preventing Data Loss and providing Email Encryption. bssgc

  • Forescout Cyber Assurance

    Chess CyberSecurity Ltd t/a CyberLab

    With Network Security Cyber Assurance organizations can fortify their cyber defense from multiple angles. This offering allows IT and security operations leaders to achieve comprehensive network visibility, enforce robust access controls, swiftly respond to incidents, seamlessly integrate within their IT and cybersecurity ecosystem, effectively manage risk, and ensure compliance.

  • CyberArk CyberArk Conjur Secrets Manager Enterprise

    INTEGRITY360 LIMITED

    Control, manage and audit non-human privileged access for applications, including commercial off-the-shelf, in-house developed applications and applications developed using DevOps tools and methodologies -- across on premises, hybrid, cloud and containerized environments.

  • 2FA API solution

    BOOMERANG I-COMMS LTD

    Boomerang delivers a robust two-factor authentication (2FA) messaging service, bolstering account security with one-time passcode (OTP) verification. Our solution equips developers with seamless integration tools for heightened protection against unauthorized access. Leveraging Boomerang's platform fortifies accounts, reducing risks and ensuring compliance with ISO 27001, Cyber Essentials, and Cyber Essentials Plus.

  • Sophos Intercept X Mobile

    SOFTCAT PLC

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • boxxe Tenable Web Application Scanning

    BOXXE LIMITED

    Simple, scalable and automated vulnerability scanning for web applications.

  • Collaboraite® Data and AI Solutions

    COLLABORAITE LTD

    Collaboraite® work with you to design secure data & AI solutions to solve your operational challenges, through design thinking and agile delivery. We create: (a) Bespoke, secure, human-centred solutions leveraging data, analytics and AI capabilities enabling digital transformation. (b) Data & AI products securely hosted and integrated in Long Arm®.

  • Check Point Harmony Email and Collaboration

    ITogether

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • Security Detection and Visibility (SIEMaaS) as a service

    PROACT IT UK LIMITED

    Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support. The service provides remote collection and analysis of logs, using a leading public cloud hosted Security Information and Event Management solution

  • Backup, and Disaster Recovery Services with DATTO

    TECHNOLOGY SERVICES GROUP LIMITED

    TSG and Datto provides an industry-leading hybrid on-premise & cloud backup & DR solution. This technology provides localised granular data backup and recovery, with a secondary cloud backup. This allows you to locally recover servers on the appliance or to recover your servers in the Datto cloud in a disaster.

  • CDW Sophos Managed Detection and Response Complete (MDR) Server

    CDW LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • SecurityCoach Training - KnowBe4

    RAZOR THORN SECURITY LTD

    SecurityCoach is the first real-time security coaching product that delivers immediate feedback to users at the moment of risky behaviour. It leverages event data from existing security stacks to deliver real-time coaching, reinforces security culture and turns insecure user behaviour into an opportunity to train them to have security top-of-mind.

  • Proofpoint Archive

    BYTES SOFTWARE SERVICES LIMITED

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house. bssgc

  • Sophos Firewall

    PHOENIX SOFTWARE LIMITED

    XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Shadow Data Security Posture Management Monitoring

    DIEGESIS LIMITED

    Guardium Insights DSPM allows you uncover hidden data, analyse data flows and identify data security vulnerabilities. Get a 360 degree view of all your sensitive data in cloud by discovering shadow data, analysing flow of data and uncovering posture vulnerabilities.

  • CDW AvePoint Opus

    CDW LIMITED

    "Comprehensive solution for Information Lifecycle Management allowing you to have complete control from creation to archive or defensible disposal, all through a central interface. Discover and understand your data, remove redundancy, optimize storage, automate lifecycle, ensure compliance, and classify content intelligently with advanced machine learning for efficiency."

  • Cisco Secure Access Service Edge (SASE)

    SOFTCAT PLC

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • Darktrace Active AI Security Platform

    BYTES SOFTWARE SERVICES LIMITED

    World-leading cyber-threat detection and real-time visibility in the Cloud. Compatible with all major Cloud providers (including AWS, Google Cloud and Microsoft Azure). The service uses self-learning technology to detect threats and anomalous behaviours. Fully configurable, it allows organisations to monitor all or selected Cloud traffic, with minimal performance impact. bssgc

  • Sophos Zero Trust Network Access (ZTNA)

    PHOENIX SOFTWARE LIMITED

    Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users.