Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1725 results found

1725 results found in Lot 2: Cloud software in the category Security risk management

  • Tenable Lumin

    PHOENIX SOFTWARE LIMITED

    Calculate, communicate and compare your cyber risk.

  • Devo (Cloud Native Logging & Security Analytics)

    2T SECURITY LTD

    Devo is a cloud-native logging and security analytics platform that releases the potential of your data to empower bold, confident action when it matters most. The Devo platform delivers real-time visibility, high-performance analytics, scalability, multitenancy, and low TCO for monitoring and securing business operations as enterprises migrate to the cloud.

  • SafeSend - Recipient Verification software

    FuseMail

    Microsoft Outlook add-in used to prevent misaddressed email or inadvertent autocomplete email mistakes by requiring the user to confirm external recipients and file attachments before an email can be sent. Our module further scans attachments and email content for particularly sensitive data, allowing companies to build additional custom DLP rules.

  • CDW Check Point Harmony SaaS

    CDW LIMITED

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.

  • NHS Custom Solutions

    DBAX LTD

    We provide bespoke software tailored for the NHS, solving business challenges through digital solutions. We leverage open-source technology and adhere to stringent security rules. Our cloud-based applications integrate seamlessly with NHS systems and offer advanced features like machine learning, supported by a team with extensive NHS experience.

  • ControlPlane Enterprise for Flux CD

    CONTROL PLANE LIMITED

    CPE-Flux is a subscription-based offering designed to meet the stringent requirements of highly regulated organisations running production cloud native environments. CPE-Flux Continuous Delivery provides a secure, stable, and efficient solution for cloud native enterprises to depend on with confidence.

  • Tenable Vulnerability Management (formerly Tenable.io)

    PHOENIX SOFTWARE LIMITED

    Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.

  • Aiimi Insight Engine – Digital Applications

    AIIMI LIMITED

    Insight Engine is our unique discovery platform. It works alongside you, using artificial intelligence to swiftly and securely serve you relevant information and insight. Bring enterprise search and insights to your low-code and no-code platforms with Aiimi Insight Engine for Digital Applications. Sample applications and APIs, widgets and technical support.

  • Data Protection Compliance Platform

    TMC3 LIMITED

    The OneTrust platform enables organisations to centrally manage and track data protection compliance activities. Enforce the governance of data protection policies and procedures across the organisation’s data landscape. The platform helps to remove the reliance on manual processes and the burden on under resourced teams with effective automation and integrations.

  • CheckPoint - Quantum Smart-1 Cloud

    VE3 GLOBAL LTD

    VE3's Check Point Smart-1 Cloud offers cloud-delivered security management, providing policy management for on-premises and IaaS security gateways, along with security event analytics and reporting via a user-friendly web-based SmartConsole.

  • boxxe Tenable Identity Exposure

    BOXXE LIMITED

    Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.

  • Cyber Resilience Training Platform (Hybrid)

    CYBEXER (UK) LTD

    The Cyber Resilience Training Platform (SaaS) delivers a cloud-based solution for organizations to practice cyber resilience. It provides scalable, realistic simulations tailored to business and public sector cyber threats, emphasizing response and recovery to ensure organizations can withstand and quickly rebound from cyber incidents.

  • Vectra Cognito Recall

    INTEGRITY360 LIMITED

    Cognito Recall from Vectra is a cloud service, provided by Vectra, which stores network metadata in support of security investigation and threat hunting. Cognito Recall stores metadata that is extracted by network sensors and makes it available to analysts to help them hunt for threats.

  • Data Platform Software

    OAKLAND GROUP SERVICES LIMITED

    We design, build, and manage data platform capabilites using full stack cloud technologies that we customise and optimise to meet our client needs. We are technology agnostic, meaning we are experts across a range of technologies including Azure, AWS, Databricks, GCP, Github, and have experience operating in secure environments.

  • Sophos Central Mobile Advanced

    Planet IT

    Sophos Mobile is a Unified Endpoint Management and Mobile Threat Defense solution. The only UEM solution that integrates natively with a leading next-gen endpoint security platform, Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10 and macOS devices.

  • Time and Motion software to monitor company resources efficiency

    ADAPPT LIMITED

    Providing everything you need to help optimise your remote employees time efficiency, increases the overall productivity of your organisation, via non-intrusive, GDPR compliant software which collates circa 50,000 data points per user/day to extrapolate the causes of bottlenecks, help to forecast resourcing requirements, and mitigate against bad practice.

  • Check Point CloudGuard Web Application Firewall (WAF) As a Service

    CHARTERHOUSE VOICE & DATA LIMITED

    Web Application and API protection. With deep application contextual analysis. Eliminates tradeoff between level of security and the complexity of managing application security. Whether applications are hosted in a data center or a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks and blocks automated attacks.

  • IRIS Intelligence Custom Management Information System

    IRIS INTELLIGENCE LIMITED

    Combining the benefits of custom software with the security of Commercial-Off-The-Shelf (COTS) software, the IRIS Intelligence software allows organisations to configure and create a Management Information Dashboard and Database. Newly configured custom MI system will automatically include integration with Microsoft Office, together with an automated audit trail and configurable dashboards.

  • Sophos Central Device Encryption

    Planet IT

    Sophos Central Device Encryption gives you the ability to manage full disk encryption from a single, integrated, web-based management center.

  • Cyber Security

    CYMBALSTREAM SOLUTIONS LIMITED

    Cymbalstream offers a range of security solutions, including Managed Detection and Response (MDR), Cloud Detection and Response (CDR), and other advanced cybersecurity services. Cymbalstream leverages Arctic Wolf's technologies, threat intelligence, and expert security analysts to deliver 24/7 monitoring, detection, and response across an organisation's IT infrastructure.

  • Application Security Posture Management

    PHOENIX SOFTWARE LIMITED

    CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • Rapid7 Insight ThreatCommand

    INTEGRITY360 LIMITED

    Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you to make informed decisions and rapidly respond to protect your business.

  • CDW Palo Alto Cortex XDR

    CDW LIMITED

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency.

  • MooD 16 and MooD 17 Licence (MBA and MAE)

    CACI LIMITED

    MooD 16 & MooD 17 software components provides a collection of software tools for deployment on-premises or via private / hybrid cloud environments.​​ MooD Business Architect and MooD Active Enterprise components can be used to build bespoke MooD Cloud Solutions.

  • SotaPROTECT Suite

    Sota Solutions Ltd

    SotaPROTECT Suite provide managed anti-virus, email security gateway, web security gateway, Multi-Factor Authentication and cyber security awareness training for staff. This provides an essential level of protection against cyber bad actors.

  • Microsoft Power Platform

    HSO ENTERPRISE SOLUTIONS LIMITED

    HSO - leverage the power of Microsoft to transform the way you work. Want transformation, cloud adoption and long-term business impact? Our vast skill across the entire Microsoft stack delivers beautiful solutions with a platform-first approach, built on robust data architecture, and realising value aligned with your strategic roadmap.

  • Cyber security risk assessment & planning

    I-NET SOFTWARE SOLUTIONS LTD

    A Digital Service Management (DSM) enabler,this service provides an assessment of your Cyber Security practices.Focused on capabilities associated with technology services and environment to: strengthen cybersecurity capabilities, enable effective and consistent evaluation and benchmark of cybersecurity capabilities. We enable prioritisation of actions and investments to improve security. unstructured big data.

  • Globalscape EFT Arcus (Fortra) - From HANDD Business Solutions (MFT)

    HANDD Business Solutions

    Globalscape EFT Arcus is a cloud-native, managed file transfer solution designed for scalability and security. It offers flexible deployment options, automated workflows, and advanced encryption for secure data transfer. Arcus simplifies file sharing across organisations while ensuring compliance with regulations and industry standards.

  • Pathlock Cloud Continuous Controls Monitoring (CCM) for SAP

    RESULTING LIMITED

    Pathlock Cloud CCM offers a comprehensive toolkit to enhance risk identification and assessment, reduce manual compliance controls efforts, and improve operational excellence. With this solution, organisations can streamline their process controls and mitigate risks more efficiently, enhancing their overall performance and success.

  • Stone Managed Internet Security Service - Cisco Umbrella

    Stone Technologies Limited Trading as Converge Technology Solutions

    Stone utilises Cisco Umbrella to deliver the most secure, reliable, and fastest internet experience to more than 100million users daily. Umbrella unifies firewall, secure web gateway, DNS-layer security, cloud access security broker (CASB), and threat intelligence solutions into a single platform to help businesses of all sizes secure their network.