Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1698 results found

1698 results found in Lot 2: Cloud software in the category Security risk management

  • Vectra Cognito Recall

    INTEGRITY360 LIMITED

    Cognito Recall from Vectra is a cloud service, provided by Vectra, which stores network metadata in support of security investigation and threat hunting. Cognito Recall stores metadata that is extracted by network sensors and makes it available to analysts to help them hunt for threats.

  • Data Platform Software

    OAKLAND GROUP SERVICES LIMITED

    We design, build, and manage data platform capabilites using full stack cloud technologies that we customise and optimise to meet our client needs. We are technology agnostic, meaning we are experts across a range of technologies including Azure, AWS, Databricks, GCP, Github, and have experience operating in secure environments.

  • Time and Motion software to monitor company resources efficiency

    ADAPPT LIMITED

    Providing everything you need to help optimise your remote employees time efficiency, increases the overall productivity of your organisation, via non-intrusive, GDPR compliant software which collates circa 50,000 data points per user/day to extrapolate the causes of bottlenecks, help to forecast resourcing requirements, and mitigate against bad practice.

  • Check Point CloudGuard Web Application Firewall (WAF) As a Service

    CHARTERHOUSE VOICE & DATA LIMITED

    Web Application and API protection. With deep application contextual analysis. Eliminates tradeoff between level of security and the complexity of managing application security. Whether applications are hosted in a data center or a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks and blocks automated attacks.

  • IRIS Intelligence Custom Management Information System

    IRIS INTELLIGENCE LIMITED

    Combining the benefits of custom software with the security of Commercial-Off-The-Shelf (COTS) software, the IRIS Intelligence software allows organisations to configure and create a Management Information Dashboard and Database. Newly configured custom MI system will automatically include integration with Microsoft Office, together with an automated audit trail and configurable dashboards.

  • Cyber Security

    CYMBALSTREAM SOLUTIONS LIMITED

    Cymbalstream offers a range of security solutions, including Managed Detection and Response (MDR), Cloud Detection and Response (CDR), and other advanced cybersecurity services. Cymbalstream leverages Arctic Wolf's technologies, threat intelligence, and expert security analysts to deliver 24/7 monitoring, detection, and response across an organisation's IT infrastructure.

  • Application Security Posture Management

    PHOENIX SOFTWARE LIMITED

    CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • Rapid7 Insight ThreatCommand

    INTEGRITY360 LIMITED

    Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you to make informed decisions and rapidly respond to protect your business.

  • CDW Palo Alto Cortex XDR

    CDW LIMITED

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency.

  • MooD 16 and MooD 17 Licence (MBA and MAE)

    CACI LIMITED

    MooD 16 & MooD 17 software components provides a collection of software tools for deployment on-premises or via private / hybrid cloud environments.​​ MooD Business Architect and MooD Active Enterprise components can be used to build bespoke MooD Cloud Solutions.

  • SotaPROTECT Suite

    SOTA SOLUTIONS LIMITED

    SotaPROTECT Suite provide managed anti-virus, email security gateway, web security gateway, Multi-Factor Authentication and cyber security awareness training for staff. This provides an essential level of protection against cyber bad actors.

  • Microsoft Power Platform

    HSO ENTERPRISE SOLUTIONS LIMITED

    HSO - leverage the power of Microsoft to transform the way you work. Want transformation, cloud adoption and long-term business impact? Our vast skill across the entire Microsoft stack delivers beautiful solutions with a platform-first approach, built on robust data architecture, and realising value aligned with your strategic roadmap.

  • Cyber security risk assessment & planning

    I-NET SOFTWARE SOLUTIONS LTD

    A Digital Service Management (DSM) enabler,this service provides an assessment of your Cyber Security practices.Focused on capabilities associated with technology services and environment to: strengthen cybersecurity capabilities, enable effective and consistent evaluation and benchmark of cybersecurity capabilities. We enable prioritisation of actions and investments to improve security. unstructured big data.

  • Globalscape EFT Arcus (Fortra) - From HANDD Business Solutions (MFT)

    HANDD BUSINESS SOLUTIONS LIMITED

    Globalscape EFT Arcus is a cloud-native, managed file transfer solution designed for scalability and security. It offers flexible deployment options, automated workflows, and advanced encryption for secure data transfer. Arcus simplifies file sharing across organisations while ensuring compliance with regulations and industry standards.

  • Pathlock Cloud Continuous Controls Monitoring (CCM) for SAP

    RESULTING LIMITED

    Pathlock Cloud CCM offers a comprehensive toolkit to enhance risk identification and assessment, reduce manual compliance controls efforts, and improve operational excellence. With this solution, organisations can streamline their process controls and mitigate risks more efficiently, enhancing their overall performance and success.

  • Stone Managed Internet Security Service - Cisco Umbrella

    Stone Technologies Limited Trading as Converge Technology Solutions

    Stone utilises Cisco Umbrella to deliver the most secure, reliable, and fastest internet experience to more than 100million users daily. Umbrella unifies firewall, secure web gateway, DNS-layer security, cloud access security broker (CASB), and threat intelligence solutions into a single platform to help businesses of all sizes secure their network.

  • CDW Check Point CloudGuard Cloud Security Posture Management (CSPM)

    CDW LIMITED

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.

  • One time passcode messaging

    BOOMERANG I-COMMS LTD

    Boomerang delivers a robust two-factor authentication (2FA) messaging service, bolstering account security with one-time passcode (OTP) verification. Our solution equips developers with seamless integration tools for heightened protection against unauthorized access. Leveraging Boomerang's platform fortifies accounts, reducing risks and ensuring compliance with ISO 27001, Cyber Essentials, and Cyber Essentials Plus.

  • CDW Sophos Network Detection and Response (NDR)

    CDW LIMITED

    "Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • Forcepoint Cloud Access Security Broker (CASB)

    GRADIAN SYSTEMS LTD

    Forcepoint CASB is a security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and Information assurance restrictions using the Cloud

  • Cisco Meraki Networking by ITGL

    CONSCIA GROUP UK LTD

    Services to cover all Cisco Meraki Software including Switches, Access Points, Firewalls, SD-WAN, IoT sensors, Cameras, Cellular gateways and Secure Access Services Edge (SASE). The Meraki dashboard is a key enabler of this service.

  • CALM SaaS (SIEM)

    CYBANETIX LIMITED

    Cybanetix Advanced Log Manager (CALM) is a Security Information and Event Management (SIEM) solution that allows organisations to log all their IT infrastructure events to one platform and overlay threat intelligence and advanced security analytics to the events collected.

  • De-installation / Decommissioning Telecoms and ICT

    NETWORK 2 SUPPLIES LIMITED

    N2S are specialists in large scale multi-site De-installations and decommissioning of IT equipment including desktops, screens, unified comms/telephony and managed print. Utilise a fleet of tracked vehicles to return equipment to headquarters for WEEE recycling or resale.

  • iProov Authentication Solution

    IPROOV LIMITED

    iProov Authentication delivers secure and convenient citizen and workforce authentication leveraging face, fingerprint, and/or palm biometrics. Cloud-based biometrics linked to a trusted identity allows individuals to smoothly authenticate across the entire identity lifecycle, from Account Login and Recovery to Device Binding and Step-up Authentication.

  • SentinelOne Endpoint Security Platform

    CYBANETIX LIMITED

    SentinelOne Endpoint Protection unifies prevention, detection, and response in a single purpose-built agent powered by machine learning and automation. It provides prevention and detection of attacks across all major vectors, rapid elimination of threats with automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics.

  • Long Arm® Platform with Secure Misattribution and Associated Services

    INTERNET INVESTIGATION SOLUTIONS LTD

    Long Arm®, is a platform for secure online investigation, open source research, and evidential capture. Our fully audited platform empowers investigators to operate on the internet with a managed digital footprint, and to capture and produce content to an evidential standard. Our Collaboraite® capability enables data & AI exploitation.

  • Tenable Cloud Security (earlier version named Tenable.cs)

    SOFTCAT PLC

    See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.

  • Sophos Intercept X Advanced with XDR

    Chess CyberSecurity Ltd t/a CyberLab

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Exchange Online Protection

    VE3 GLOBAL LTD

    Exchange Online Protection safeguards your cloud-based or on-premises email with anti-spam and anti-malware protection. It offers financially backed SLAs and guarantees 99.999% network uptime, effectively shielding against 100% of known viruses and 99% of spam. Additionally, it provides reporting and message trace capabilities along with policy-based filtering.

  • DocuBot

    VE3 GLOBAL LTD

    DocuBot is an AI-powered extension that integrates with CRM systems and enterprise platforms, providing intelligent conversational access to internal documents. It enhances user engagement, streamlines document retrieval, and boosts operational efficiency through advanced AI-driven natural language processing capabilities.