Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Varonis SaaS Data Security Platform

    CM SECURITY LTD

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • SecurityRating.com: Third Party Risk & Vendor Risk Management + Attack Surface Management Platform

    Infosec Ventures

    SecurityRating.com: See your attack surface and third-party (vendor) risk with unrivalled clarity. Reduce your team’s workload with automation. Continuously monitor IT infrastructure. Get insights into vulnerabilities and threats, helping organisations manage risk and comply with regulations. Third-Party & Supply Chain Risk & Attack Surface Management made easy. Finally.

  • OSINT, WEBINT, SOCMINT & III = BLD COUNTER OPS PaaS

    BLUELIGHTSDIGITAL LTD

    COUNTER is an ecosystem of OSINT, WEBINT, SOCMINT and SIGINT Ops capabilities. Our solutions are designed to capture, acquire, identify, analyse and assess intelligence & investigations data for operators, analysts and investigators. Offering many levels of capability with service and support available from UK security cleared employees and expert partnerships.

  • Gov360 OpenSky : Enterprise Data & AI - Data Governance & Security (DGSaaS) - Purview

    OpenSky Data Systems

    OpenSky's "Data Governance & Security as a Service" leverages Microsoft Purview to provide comprehensive data protection, governance, and compliance across your multicloud and hybrid data estate. Our experts help you discover, understand, and secure your data, mitigate risks, and simplify compliance through a unified, AI-powered platform.

  • MTI SOC and SIEM Managed Service

    MTI TECHNOLOGY LIMITED

    MTI’s Managed SIEM / SOC platform applies industry-leading technologies. Asset Discovery/Management, Vulnerability and Patch Scanning, SIEM Logging/Correlation/Alerting, Intrusion Detection, Automated Incident Response/Defence, User Behaviour Analytics, Threat Intelligence, Full Cloud Integration, Custom Dashboards/Playbooks, Service Desk alerting/ticketing, XDR, MDR, MXDR, 24x7, Defender, Sentinel, SC-Cleared UK-based NCSC cyber experts. Threat Simulation Exercises.

  • Risk Based Vulnerability Management

    GAMMA NETWORK SOLUTIONS LIMITED

    Identify and prioritise vulnerabilities based on risk to your business. Managed in the cloud.

  • Tenable One - Standard

    BYTES SOFTWARE SERVICES LIMITED

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance. Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory bssgc

  • Trustmarque Check Point Infinity Product Set

    TRUSTMARQUE SOLUTIONS LIMITED

    A range of cloud-based security service products that deliver secure access to cloud applications and resources, simplifying security management and protecting user against advanced threats.

  • Censornet Cloud Application Security Broker (CASB)

    CM SECURITY LTD

    CASB provides administrators with comprehensive visibility and control over the usage of SaaS platforms within their organisation. It helps manage shadow IT usage, allowing organisations to identify and address security risks associated with unauthorised cloud applications and prevent unauthorised sharing of sensitive data.

  • ServiceNow Adoption (Implementation)

    Scarce IT

    Through our fast-track adoption approach, we embed ServiceNow quickly and optimally, speed your ROI, and facilitate digital and cultural transformation for your business. Whether you are considering ServiceNow, or have purchased and need help implementing, Scarce will deliver you successfully, affordably & speedily onto the world’s leading Enterprise IT Platform.

  • Neo Technology Accessibility Assessment Service

    NEO TECHNOLOGY LIMITED

    Neo Technology's Accessibility Assessment Service ensures digital products and services comply with WCAG standards and accessibility regulations. Our certified UX practitioners conduct thorough audits, providing actionable insights and recommendations for improving accessibility and achieving compliance.

  • Cloudflare Zero Trust Network Access (ZTNA)

    SOFTCAT PLC

    Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.

  • CrowdStrike Falcon Complete MDR

    INTEGRITY360 LIMITED

    Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.

  • Check Point CloudGuard Intelligence - Intrusion Detection, Threat Hunting & Remediation

    CHARTERHOUSE VOICE & DATA LIMITED

    CloudGuard Intelligence (previously called CloudGuard Log.ic) delivers advanced cloud intelligence and simplified visualisation for faster and more efficient incident response. It provides more effective incident detection and auto-remediation, augmented through AI and ML, across multi-cloud environments.

  • Workspace ONE Access and Hub Services

    XTRAVIRT LIMITED

    Workspace ONE Access can provide multi-factor authentication, conditional access and single sign-on across SaaS, web, and native mobile apps. Brokering different identity stores and providers, Workspace ONE Access can deliver apps from on-premises and multi-cloud infrastructures. Workspace ONE Hub Services provides a centralized app catalog plus notifications, people-search, and more.

  • Heimdal Security - Patch and Asset Management

    NETWORK UTILITIES (SYSTEMS) LIMITED

    Automate your vulnerability management and save valuable time and resources with a patch management solution that lets you deploy and patch any Microsoft and Linux OS, 3rd party and proprietary software, on-the-fly according to any schedule. With complete visibility and granular control over your entire software inventory.

  • Web Application Security Platform ('WASP')

    JUMPING RIVERS LTD

    Our Web Application Security Platform allows you to easy monitor external resources that Shiny apps and markdown documents are using. When a user visits any application on your RStudio Connect server, this will silently trigger a comparison of your web-page with an a pre-defined allowed resource list.

  • Orca Security CNAPP

    INTEGRITY360 LIMITED

    Orca Security is the leading agentless CNAPP that allows security teams to work smarter, not harder. Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and focus on remediating the actual risks that matter most.

  • Forcepoint Behavioural Analytics (FBA)

    GRADIAN SYSTEMS LTD

    Forcepoint Behavioural Analytics (FBA) enables security teams to proactively monitor for high risk behaviour inside the enterprise. Uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud

  • Drata Automated Governance, Risk & Compliance Platform

    Security Software Solutions Ltd (S3 Ltd)

    Drata is a security/compliance automation platform that continuously monitors and collects evidence of your security controls, while streamlining workflows to ensure audit-readiness. It’s an all in one GRC platform, integrating with all your SaaS services to bring compliance status of all your people, devices, assets, and vendors into one place.

  • Google Chronicle Security Operation Platform, SIEM & SOAR

    KHIPU NETWORKS LIMITED

    Chronicle offers a unified experience across SIEM, SOAR, and threat intelligence to drive better detection, investigation, and response. Collect security telemetry data, apply threat intel to identify high priority threats, drive response with playbook automation, case management, and collaboration.

  • Proofpoint Insider Threat Management

    SOFTCAT PLC

    Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly. And we correlate user activity and data movement to protect you from insider-led data breaches.

  • Check Point CloudGuard Network Security - For Azure Virtual WAN

    ITogether

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.

  • Sentinal One

    COMMUNICATION STEM LIMITED

    Sentinal One Singularity Complete provides best-in-breed EPP & EDR capabilities in one platform, management console, and agent. Designed for organizations seeking enterprise-grade prevention, detection, and response scalable across the enterprise, coupled with custom automations, Singularity Complete empowers security teams to easily identify and secure every user endpoint on their network

  • Sophos Network Detection and Response

    Chess CyberSecurity Ltd t/a CyberLab

    Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • TRUSTMARQUE FORCEPOINT PRODUCT SUITE

    TRUSTMARQUE SOLUTIONS LIMITED

    Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organisations while driving digital transformation and growth. Their solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value

  • Trend Micro One

    INTEGRITY360 LIMITED

    Remote access to Trend Micro’s infrastructure is strictly controlled and monitored. All authentication methods used adhere to industry best practices/standards such ascertificate-based and/or multi-factor authentication. Where appropriate, single sign-on (SSO) leveraging the corporate directory is used.

  • Microsoft Power Platform Implementation Services including Dynamics 365

    WR LOGIC LIMITED

    The Application Development Teams work in squads to develop next generation cloud-based applications. Specialising in integration with PaaS services, the team develop responsive and feature rich applications that utilise the best technologies the cloud has to offer. Including PowerApps, PowerPlatform supporting the common data platform Dynamics 365

  • Cloud Backup, Data Protection, Network & Email Security, DRaaS

    PMD DATA SOLUTIONS LIMITED

    Specialist reseller of cloud-based backup, email protection, data retention, archive, migration and DRaaS (Disaster Recovery as a Service). Partner technologies include Barracuda, AvePoint, Redstor, Unitrends & Spanning. Protection for MicroSoft Office 365, Google Workspace, Google Classroom, Dynamics 365, Salesforce and Azure workloads.

  • Claroty Secure Remote Access (SRA / RAS)

    BARRIER NETWORKS LIMITED

    Frictionless, Reliable, and Highly Secure Remote Access for Industrial Networks.