Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1725 results found

1725 results found in Lot 2: Cloud software in the category Security risk management

  • CDW Check Point CloudGuard Cloud Security Posture Management (CSPM)

    CDW LIMITED

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.

  • One time passcode messaging

    BOOMERANG I-COMMS LTD

    Boomerang delivers a robust two-factor authentication (2FA) messaging service, bolstering account security with one-time passcode (OTP) verification. Our solution equips developers with seamless integration tools for heightened protection against unauthorized access. Leveraging Boomerang's platform fortifies accounts, reducing risks and ensuring compliance with ISO 27001, Cyber Essentials, and Cyber Essentials Plus.

  • CDW Sophos Network Detection and Response (NDR)

    CDW LIMITED

    "Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • Forcepoint Cloud Access Security Broker (CASB)

    Gradian Systems Ltd

    Forcepoint CASB is a security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and Information assurance restrictions using the Cloud

  • Cisco Meraki Networking by ITGL

    Conscia UK

    Services to cover all Cisco Meraki Software including Switches, Access Points, Firewalls, SD-WAN, IoT sensors, Cameras, Cellular gateways and Secure Access Services Edge (SASE). The Meraki dashboard is a key enabler of this service.

  • CALM SaaS (SIEM)

    CYBANETIX LIMITED

    Cybanetix Advanced Log Manager (CALM) is a Security Information and Event Management (SIEM) solution that allows organisations to log all their IT infrastructure events to one platform and overlay threat intelligence and advanced security analytics to the events collected.

  • De-installation / Decommissioning Telecoms and ICT

    Network 2 Supplies Ltd

    N2S are specialists in large scale multi-site De-installations and decommissioning of IT equipment including desktops, screens, unified comms/telephony and managed print. Utilise a fleet of tracked vehicles to return equipment to headquarters for WEEE recycling or resale.

  • iProov Authentication Solution

    iProov Limited

    iProov Authentication delivers secure and convenient citizen and workforce authentication leveraging face, fingerprint, and/or palm biometrics. Cloud-based biometrics linked to a trusted identity allows individuals to smoothly authenticate across the entire identity lifecycle, from Account Login and Recovery to Device Binding and Step-up Authentication.

  • SentinelOne Endpoint Security Platform

    CYBANETIX LIMITED

    SentinelOne Endpoint Protection unifies prevention, detection, and response in a single purpose-built agent powered by machine learning and automation. It provides prevention and detection of attacks across all major vectors, rapid elimination of threats with automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics.

  • Long Arm® Platform with Secure Misattribution and Associated Services

    INTERNET INVESTIGATION SOLUTIONS LTD

    Long Arm®, is a platform for secure online investigation, open source research, and evidential capture. Our fully audited platform empowers investigators to operate on the internet with a managed digital footprint, and to capture and produce content to an evidential standard. Our Collaboraite® capability enables data & AI exploitation.

  • Tenable Cloud Security (earlier version named Tenable.cs)

    SOFTCAT PLC

    See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.

  • Sophos Intercept X Advanced with XDR

    Cyberlab

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Exchange Online Protection

    VE3 GLOBAL LTD

    Exchange Online Protection safeguards your cloud-based or on-premises email with anti-spam and anti-malware protection. It offers financially backed SLAs and guarantees 99.999% network uptime, effectively shielding against 100% of known viruses and 99% of spam. Additionally, it provides reporting and message trace capabilities along with policy-based filtering.

  • DocuBot

    VE3 GLOBAL LTD

    DocuBot is an AI-powered extension that integrates with CRM systems and enterprise platforms, providing intelligent conversational access to internal documents. It enhances user engagement, streamlines document retrieval, and boosts operational efficiency through advanced AI-driven natural language processing capabilities.

  • Email Authentication Platform, incorporating SPF, DKIM, DMARC, BIMI, MTA-STS & TLS-RPT.

    Infosec Ventures

    EmailAuthentication-as-a-Service platform enables Brand Protection, Anti-Spoofing, Anti-Phishing, enhances email deliverability and provides full visibility of email as a channel. It uses SPF, DKIM, BIMI and DMARC. DMARC is part of the Active Cyber Defence Program. We provide Security Awareness & Training alongwith EmailRemediation to mitigate risk at the Human Layer.

  • Cyber SOC/SIEM as a Service

    ICYBERDEFENCE LIMITED

    The solution will provide a Cyber Security Operational Centre (SOC) capability using a centralised Security Information and Event Management (SIEM) tool that aggregates log data from various data sources. Datasources include the following but ‘not limited to’ End User Compute (EUC) devices, network, security,servers and applications.

  • Check Point CloudGuard Code Security (Spectral)

    LRQA

    CloudGuard Code Security, provides automated tools that integrate with developers’ tools to detect code-vulnerabilities and to identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends. With CloudGuard Code Security, organizations can prevent exposing API keys, tokens and credentials, in addition to remediating security misconfigurations.

  • Forcepoint Insider Threat (FIT)

    Cyberlab

    Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 15 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.

  • Computacenter - Proofpoint Security Awareness Training

    COMPUTACENTER (UK) LIMITED

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • Vehicle fleet and resource management system

    LIGHTBULB ANALYTICS LIMITED

    Lightbulb Analytics [LBA] IR3 system is a fleet and resource management system which enables users to optimise their fleet and resources. IR3 achieves this by providing features such as live tracking, vehicle status, trip replay, driver behaviour, vehicle and personnel utilisation and potential collision analysis.

  • Social Engineering - Simulated Phishing Testing

    LEIDOS INNOVATIONS UK LTD

    Leidos provides simulated phishing attacks to provide security awareness training and a greater understanding of how an organisation’s users respond to different types of suspicious mails/webpages/SMS/phone calls. We also provide an independent benchmark of the effectiveness of your security awareness campaigns, defences and prioritised remediation recommendations.

  • Tanium Converged End Point Management (XEM)

    PHOENIX SOFTWARE LIMITED

    Visibility, control, remediation of endpoints in real-time, cloud-scale and autonomous - Tanium offers the only converged endpoint management (XEM) platform that combines end-to-end visibility, control, and remediation in one place.

  • OpenText Universal Discovery and CMDB

    WM Promus

    Micro Focus Universal Discovery (UD) and Universal Configuration Management Database (UCMDB) automatically collect (by discovery or integration), reconcile, manage, and present data for hardware, software, applications, services and their interdependencies in Hybrid IT environments. Enables management of hybrid IT and multi-cloud environments.

  • Microsoft Windows 365

    BYTES SOFTWARE SERVICES LIMITED

    Windows operating system updated in the cloud with Windows Information Protection, Windows Hello for Business, Credential Guard, Device Guard, App Locker, plus Windows Defender Advanced Threat Protection. Can be used with either Windows 10 or Windows 11 bssgc

  • boxxe Cloudflare Cloud Email Security

    BOXXE LIMITED

    Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.

  • CDW Sophos Intercept X Advanced with XDR

    CDW LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Backupify for Google Workspace via Netpremacy

    Netpremacy Limited

    Backupify protects your most important cloud data through secure, automatic, daily backup. Backupify allows search and restore of files with advanced administrative features, safeguarding your business from data loss caused by user errors, malicious deletions, hackers, and application errors. Backs-up data in Google Mail, Drive, Calendar, Contacts, and Shared Drives.

  • Proofpoint DLP Transform Package

    INTEGRITY360 LIMITED

    Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.

  • Sophos Managed Risk

    PHOENIX SOFTWARE LIMITED

    SophosManaged Risk is a vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. With SophosManaged Risk, our experienced analysts identify high-priority cybersecurity

  • Computacenter - IBM WatsonX.Governance

    COMPUTACENTER (UK) LIMITED

    WatsonX.Governance provides end-to-end monitoring for machine learning and generative AI models. Monitor your foundation model and machine learning assets from request to production. Collect facts about models that are built with IBM tools or third-party providers in a single dashboard to aid in meeting compliance and governance goals.