Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1553 results found

1553 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Neo Technology Digital Document Management Solution

    NEO TECHNOLOGY LIMITED

    Neo Technology's Digital Document Management Solution offers a scalable, browser-based platform for efficiently and securely managing document and data lifecycles. Through robust automation and workflow capabilities, it optimises core service delivery by reducing administrative burdens, automating processes, and facilitating seamless integration, ultimately enhancing agility and delivering cost savings and efficiencies.

  • Sophos Central Intercept X Advanced with XDR

    Bytes Software Services

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visibility across other 3rd party security vendors. bssgc

  • Forescout NetSec Core

    CHESS ICT LIMITED

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assets.

  • Forcepoint Data Guard

    CHESS ICT LIMITED

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • CDW CyberArk Conjur Secrets Manager Enterprise

    CDW Limited

    Control, manage and audit non-human privileged access for applications, including commercial off-the-shelf, in-house developed applications and applications developed using DevOps tools and methodologies -- across on premises, hybrid, cloud and containerized environments.

  • AvePoint Cloud Backup

    Softcat Limited

    Immutable, Air-Gapped Cloud to Cloud Backups for Microsoft 365, Dynamics 365, Microsoft Azure, Salesforce and Google Workspace

  • Tenable Identity Exposure (formerly Tenable.ad)

    Softcat Limited

    Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.

  • Trustmarque Palo Alto Cortex XDR

    Trustmarque Solutions Limited

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivalled security and operational efficiency.

  • KnowBe4 - Email Phishing and Security Awareness Training

    Somerford Associates Limited

    KnowBe4 empowers your workforce to make smarter security decisions every day. Over 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk. KnowBe4 builds a human layer of defence so organisations can fortify user behaviour with new-school security awareness and compliance training.

  • Occamsec InCenter Penetration Testing, Threat Hunting Platform.

    Barrier Networks

    Incenter SaaS platform : continuous penetration-testing, automation and human testers, continually test for vulnerabilities in applications, infrastructure and software. Penetration-Testing: Ethical hacker team providing penetration testing to find vulnerabilities and risk. Threat Hunting: Consulting looking for IOC within organisation. "Teaming": Assessing attack vectors (Red), Defensive team (Blue) and mix (Purple)

  • Proofpoint Advanced Package

    INTEGRITY360 LIMITED

    Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.

  • Konsolute Kolumbus - Data Discovery Tool

    KONSOLUTE

    Enhance your data analysis and discovery with Konsolute Kolumbus, a powerful tool designed for discovering, visualising, and analysing organisational data. Kolumbus simplifies understanding large datasets, supports compliance, and aids in effective data migration by identifying key data elements and structuring them through intelligent taxonomy creation.

  • ESET Protect Complete

    INTEGRITY360 LIMITED

    Our combination of spam filtering, anti malware scanning, anti phishing and cloud sandboxing helps protect your organization against infections and targeted attacks, as well as blocking new, never-before-seen types of threats, especially ransomware.

  • Check Point CloudGuard Network Security - For Azure Virtual WAN

    Softcat Limited

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.

  • Mimecast Cybergraph

    Chess CyberSecurity Ltd

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • Netapp - Cloud Data Sense

    Softcat Limited

    Cloud Data Sense is a data mapping and classification tool, across your hybrid cloud and on-premise environment. Driven by our powerful AI algorithms, we provide automated controls and reporting so that you can always stay on top of your data

  • Sophos Network Detection and Response

    Softcat Limited

    Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • CrowdStrike Falcon Exposure Management

    INTEGRITY360 LIMITED

    CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Mimecast Cybergraph

    INTEGRITY360 LIMITED

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • Log Management ( FortiAnalzyer)

    FullProxy Ltd

    FortiAnalyzer is a centralized logging, analytics, and reporting appliance. It's designed to provide organizations with comprehensive visibility into their network security infrastructure. It collects, analyzes, and correlates log data from Fortinet security devices, including firewalls, switches, access points, and more, to help organizations monitor and manage their security posture effectively.

  • Netwrix Auditor

    INTEGRITY360 LIMITED

    Detect security threats, prove compliance and increase IT team efficiency with IT audit software from Netwrix

  • Application Security Services

    SALUS DIGITAL SECURITY LIMITED

    Gathering independent assurance of cloud service provision and operation against legal, Government, and Industry standards

  • Call Centre Case Management

    Claritas Solutions Ltd

    Empowers users to have complete control of your customers journey. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Sophos Central Email Advanced

    Bytes Software Services

    Sophos Email is a cloud-based secure email gateway solution built to integrate seamlessly with popular email platforms (Exchange Online, Google Suite etc..). Sophos Email is engineered to keep businesses safe from email threats such as Malware, Zero Day, Phishing, Spam while also preventing Data Loss and providing Email Encryption. bssgc

  • Forescout Cyber Assurance

    Chess CyberSecurity Ltd

    With Network Security Cyber Assurance organizations can fortify their cyber defense from multiple angles. This offering allows IT and security operations leaders to achieve comprehensive network visibility, enforce robust access controls, swiftly respond to incidents, seamlessly integrate within their IT and cybersecurity ecosystem, effectively manage risk, and ensure compliance.

  • CyberArk CyberArk Conjur Secrets Manager Enterprise

    INTEGRITY360 LIMITED

    Control, manage and audit non-human privileged access for applications, including commercial off-the-shelf, in-house developed applications and applications developed using DevOps tools and methodologies -- across on premises, hybrid, cloud and containerized environments.

  • 2FA API solution

    Boomerang I-Comms Ltd

    Boomerang delivers a robust two-factor authentication (2FA) messaging service, bolstering account security with one-time passcode (OTP) verification. Our solution equips developers with seamless integration tools for heightened protection against unauthorized access. Leveraging Boomerang's platform fortifies accounts, reducing risks and ensuring compliance with ISO 27001, Cyber Essentials, and Cyber Essentials Plus.

  • Sophos Intercept X Mobile

    Softcat Limited

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • boxxe Tenable Web Application Scanning

    BOXXE LIMITED

    Simple, scalable and automated vulnerability scanning for web applications.

  • Collaboraite® Data and AI Solutions

    COLLABORAITE LTD

    Collaboraite® work with you to design secure data & AI solutions to solve your operational challenges, through design thinking and agile delivery. We create: (a) Bespoke, secure, human-centred solutions leveraging data, analytics and AI capabilities enabling digital transformation. (b) Data & AI products securely hosted and integrated in Long Arm®.