Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1554 results found

1554 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Check Point Harmony Email and Collaboration

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • Security Detection and Visibility (SIEMaaS) as a service

    Proact IT UK Limited

    Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support. The service provides remote collection and analysis of logs, using a leading public cloud hosted Security Information and Event Management solution

  • Backup, and Disaster Recovery Services with DATTO

    TECHNOLOGY SERVICES GROUP

    TSG and Datto provides an industry-leading hybrid on-premise & cloud backup & DR solution. This technology provides localised granular data backup and recovery, with a secondary cloud backup. This allows you to locally recover servers on the appliance or to recover your servers in the Datto cloud in a disaster.

  • Getvisibility Synergy DSPM+

    Gradian Systems Ltd

    Quickly gain full visibility and context for your data, whether in motion or at rest, across on-premises and cloud environments. Enhanced by the power of our customisable, accurate, and explainable AI Mesh, this is a game-changer for security in Generative AI usage and governance.

  • CDW Sophos Managed Detection and Response Complete (MDR) Server

    CDW Limited

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • SecurityCoach Training - KnowBe4

    RAZOR THORN SECURITY LTD

    SecurityCoach is the first real-time security coaching product that delivers immediate feedback to users at the moment of risky behaviour. It leverages event data from existing security stacks to deliver real-time coaching, reinforces security culture and turns insecure user behaviour into an opportunity to train them to have security top-of-mind.

  • Proofpoint Archive

    Bytes Software Services

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house. bssgc

  • Sophos Firewall

    Phoenix Software Ltd

    XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Shadow Data Security Posture Management Monitoring

    Diegesis Limited

    Guardium Insights DSPM allows you uncover hidden data, analyse data flows and identify data security vulnerabilities. Get a 360 degree view of all your sensitive data in cloud by discovering shadow data, analysing flow of data and uncovering posture vulnerabilities.

  • CDW AvePoint Opus

    CDW Limited

    "Comprehensive solution for Information Lifecycle Management allowing you to have complete control from creation to archive or defensible disposal, all through a central interface. Discover and understand your data, remove redundancy, optimize storage, automate lifecycle, ensure compliance, and classify content intelligently with advanced machine learning for efficiency."

  • Cisco Secure Access Service Edge (SASE)

    Softcat Limited

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • Darktrace Active AI Security Platform

    Bytes Software Services

    World-leading cyber-threat detection and real-time visibility in the Cloud. Compatible with all major Cloud providers (including AWS, Google Cloud and Microsoft Azure). The service uses self-learning technology to detect threats and anomalous behaviours. Fully configurable, it allows organisations to monitor all or selected Cloud traffic, with minimal performance impact. bssgc

  • Sophos Zero Trust Network Access (ZTNA)

    Phoenix Software Ltd

    Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users.

  • Varonis SaaS Data Security Platform

    CM Security Ltd

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • SecurityRating.com: Third Party Risk & Vendor Risk Management + Attack Surface Management Platform

    Infosec Ventures

    SecurityRating.com: See your attack surface and third-party (vendor) risk with unrivalled clarity. Reduce your team’s workload with automation. Continuously monitor IT infrastructure. Get insights into vulnerabilities and threats, helping organisations manage risk and comply with regulations. Third-Party & Supply Chain Risk & Attack Surface Management made easy. Finally.

  • OSINT, WEBINT, SOCMINT & III = BLD COUNTER OPS PaaS

    Blue Lights Digital

    COUNTER is an ecosystem of OSINT, WEBINT, SOCMINT and SIGINT Ops capabilities. Our solutions are designed to capture, acquire, identify, analyse and assess intelligence & investigations data for operators, analysts and investigators. Offering many levels of capability with service and support available from UK security cleared employees and expert partnerships.

  • Gov360 OpenSky : Enterprise Data & AI - Data Governance & Security (DGSaaS) - Purview

    Open Sky Data Systems

    OpenSky's "Data Governance & Security as a Service" leverages Microsoft Purview to provide comprehensive data protection, governance, and compliance across your multicloud and hybrid data estate. Our experts help you discover, understand, and secure your data, mitigate risks, and simplify compliance through a unified, AI-powered platform.

  • MTI SOC and SIEM Managed Service

    MTI Technology Ltd

    MTI Managed SIEM (Security Information and Event Management) provides a centralised security monitoring, threat intelligence and response service for on-premises, hybrid and cloud environments. Our UK based Security Operations Centre, with SC Cleared analysts, is fully integrated with Alien Vault's market leading technology and offers 24*7*365 assurance to your business.

  • Risk Based Vulnerability Management

    GAMMA NETWORK SOLUTIONS LIMITED

    Identify and prioritise vulnerabilities based on risk to your business. Managed in the cloud.

  • Tenable One - Standard

    Bytes Software Services

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance. Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory bssgc

  • Denodo Enterprise Platform

    Digital Modus Ltd

    Denodo Virtualisation and Logical Data Fabric provides a unified data delivery platform that abstracts access to multiple data systems for business consumers, hiding the complexity and exposing the data in business-friendly formats, while at the same time guaranteeing the delivery of data according to predefined semantics and data governance rules

  • Trustmarque Check Point Infinity Product Set

    Trustmarque Solutions Limited

    A range of cloud-based security service products that deliver secure access to cloud applications and resources, simplifying security management and protecting user against advanced threats.

  • Censornet Cloud Application Security Broker (CASB)

    CM Security Ltd

    CASB provides administrators with comprehensive visibility and control over the usage of SaaS platforms within their organisation. It helps manage shadow IT usage, allowing organisations to identify and address security risks associated with unauthorised cloud applications and prevent unauthorised sharing of sensitive data.

  • ServiceNow Adoption (Implementation)

    Scarce IT

    Through our fast-track adoption approach, we embed ServiceNow quickly and optimally, speed your ROI, and facilitate digital and cultural transformation for your business. Whether you are considering ServiceNow, or have purchased and need help implementing, Scarce will deliver you successfully, affordably & speedily onto the world’s leading Enterprise IT Platform.

  • Neo Technology Accessibility Assessment Service

    NEO TECHNOLOGY LIMITED

    Neo Technology's Accessibility Assessment Service ensures digital products and services comply with WCAG standards and accessibility regulations. Our certified UX practitioners conduct thorough audits, providing actionable insights and recommendations for improving accessibility and achieving compliance.

  • Cloudflare Zero Trust Network Access (ZTNA)

    Softcat Limited

    Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.

  • CrowdStrike Falcon Complete MDR

    INTEGRITY360 LIMITED

    Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.

  • Check Point CloudGuard Intelligence - Intrusion Detection, Threat Hunting & Remediation

    Charterhouse Voice & Data

    CloudGuard Intelligence (previously called CloudGuard Log.ic) delivers advanced cloud intelligence and simplified visualisation for faster and more efficient incident response. It provides more effective incident detection and auto-remediation, augmented through AI and ML, across multi-cloud environments.

  • Workspace ONE Access and Hub Services

    XTRAVIRT LIMITED

    Workspace ONE Access can provide multi-factor authentication, conditional access and single sign-on across SaaS, web, and native mobile apps. Brokering different identity stores and providers, Workspace ONE Access can deliver apps from on-premises and multi-cloud infrastructures. Workspace ONE Hub Services provides a centralized app catalog plus notifications, people-search, and more.

  • Heimdal Security - Patch and Asset Management

    Network Utilities (Systems) Ltd

    Automate your vulnerability management and save valuable time and resources with a patch management solution that lets you deploy and patch any Microsoft and Linux OS, 3rd party and proprietary software, on-the-fly according to any schedule. With complete visibility and granular control over your entire software inventory.