Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1557 results found

1557 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Web Application Security Platform ('WASP')

    Jumping Rivers Ltd

    Our Web Application Security Platform allows you to easy monitor external resources that Shiny apps and markdown documents are using. When a user visits any application on your RStudio Connect server, this will silently trigger a comparison of your web-page with an a pre-defined allowed resource list.

  • Orca Security CNAPP

    INTEGRITY360 LIMITED

    Orca Security is the leading agentless CNAPP that allows security teams to work smarter, not harder. Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and focus on remediating the actual risks that matter most.

  • Forcepoint Behavioural Analytics (FBA)

    Gradian Systems Ltd

    Forcepoint Behavioural Analytics (FBA) enables security teams to proactively monitor for high risk behaviour inside the enterprise. Uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud

  • Drata Automated Governance, Risk & Compliance Platform

    S3 Ltd

    Drata is a security/compliance automation platform that continuously monitors and collects evidence of your security controls, while streamlining workflows to ensure audit-readiness. It’s an all in one GRC platform, integrating with all your SaaS services to bring compliance status of all your people, devices, assets, and vendors into one place.

  • Google Chronicle Security Operation Platform, SIEM & SOAR

    Khipu Networks Limited

    Chronicle offers a unified experience across SIEM, SOAR, and threat intelligence to drive better detection, investigation, and response. Collect security telemetry data, apply threat intel to identify high priority threats, drive response with playbook automation, case management, and collaboration.

  • Proofpoint Insider Threat Management

    Softcat Limited

    Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly. And we correlate user activity and data movement to protect you from insider-led data breaches.

  • Check Point CloudGuard Network Security - For Azure Virtual WAN

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.

  • Sentinal One

    Communication-STEM Ltd

    Sentinal One Singularity Complete provides best-in-breed EPP & EDR capabilities in one platform, management console, and agent. Designed for organizations seeking enterprise-grade prevention, detection, and response scalable across the enterprise, coupled with custom automations, Singularity Complete empowers security teams to easily identify and secure every user endpoint on their network

  • Sophos Network Detection and Response

    Chess CyberSecurity Ltd

    Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • TRUSTMARQUE FORCEPOINT PRODUCT SUITE

    Trustmarque Solutions Limited

    Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organisations while driving digital transformation and growth. Their solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value

  • Trend Micro One

    INTEGRITY360 LIMITED

    Remote access to Trend Micro’s infrastructure is strictly controlled and monitored. All authentication methods used adhere to industry best practices/standards such ascertificate-based and/or multi-factor authentication. Where appropriate, single sign-on (SSO) leveraging the corporate directory is used.

  • Microsoft Power Platform Implementation Services including Dynamics 365

    WR LOGIC LIMITED

    The Application Development Teams work in squads to develop next generation cloud-based applications. Specialising in integration with PaaS services, the team develop responsive and feature rich applications that utilise the best technologies the cloud has to offer. Including PowerApps, PowerPlatform supporting the common data platform Dynamics 365

  • Cloud Backup, Data Protection, Network & Email Security, DRaaS

    PMD Data Solutions Limited

    Specialist reseller of cloud-based backup, email protection, data retention, archive, migration and DRaaS (Disaster Recovery as a Service). Partner technologies include Barracuda, AvePoint, Redstor, Unitrends & Spanning. Protection for MicroSoft Office 365, Google Workspace, Google Classroom, Dynamics 365, Salesforce and Azure workloads.

  • Claroty Secure Remote Access (SRA / RAS)

    Barrier Networks

    Frictionless, Reliable, and Highly Secure Remote Access for Industrial Networks.

  • CrowdStrike Falcon Cloud Security

    BT PLC

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • Kentico hosting

    Spindogs Ltd

    Kentico hosting. For mobile optimised, accessible websites. Spindogs' Kentico CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.

  • Tessian DLP

    Softcat Limited

    Adaptive Email DLP uses behavioural AI to learn about your employees’ normal email sending behaviours, their trusted relationships and how they communicate sensitive data. It then analyses each email to detect anomalous behaviour, notifying admins of potential data loss incidents. warn users in real-time, prevent sensitive data loss through email.

  • Objective Nexus an ECM/EDRM service

    Objective Corporation Limited

    Objective Nexus brings together key Content Solutions to store, govern and manage your information. Integration into Teams ensures corporate governance is applied. Powerful business processes empower users and automates workflow enabling you to take meaningful actions. Meanwhile, your information is protected with military-approved levels of security.

  • Teramind - Compliance, Security and Productivity

    Southern Communications Corporate Solutions T/A SCG Corporate

    Data Loss Prevention (DLP) is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection techniques, and contextual analysis to identify and categorize sensitive data and IP.

  • Digital Managed Services

    Panlogic Limited - Digital Engineering

    Hosting (physical vs. virtualised vs. cloud; shared vs. dedicated) Infrastructure support Application support Maintenance Digital infrastructure audit Disaster Recovery (DR) & 'hot'/'warm'/'cold' High availability (managing demand) Managed Services audit (investigation), migration (taking on third-party services) and Business As Usual (BAU)

  • Managed 24x7 MXDR Security Operations Centre

    Cyberfort Ltd

    Cyberfort's MXDR defends your organisation from cyber threats 24x7x365. Utilising the right combination of Microsoft Sentinel and Elastic SIEM for each customer, SOAR enables ingest efficiency, increased ROI and reduces cost . Detecting, responding, and remediating with high speed, accuracy and transparency, you'll see everything we do to defend you.

  • Computacenter - ProofPoint Archive

    Computacenter (UK) Ltd

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.

  • TrustedFilter®

    4Secure

    TrustedFilter transforms, inspects, and filters a wide spectrum of data types and protocols such that only 'known good' data is allowed to cross network boundaries and between networks of different trust. We also provide file content disarm and reconstruction to sanitise files during transfer.

  • Objective Connect

    Objective Corporation Limited

    Secure content and process sharing for Digital Government. Objective Connect enables government organisations to securely create Workspaces with external partner organisations. With ISO27001 accreditation and hosted across multiple AWS UK zones, many public-sector organisations are using Connect as their only tool for external secure file sharing and collaboration.

  • iboss Zero Trust Secure Access Service Edge

    Softcat Limited

    iboss utilises a containerised cloud architecture allowing customers to easily migrate from legacy appliances, whilst maintaining 100% dedicated IP address space in the cloud. This allows for PDNS intergration, and admin created GDPR Zones with dedicated UK datacentres. Packages include Core Filtering, Malware detection and Data Loss Prevention

  • Attendance & Attainment Collection Service for CIC/CIN/CP/EHCP

    eGov Solutions LTD

    We offer a secure cloud-based Attendance & Attainment Collection and Monitoring Service. Fully supported ePEP application for all Vulnerable cohorts: Children Looked After (CLA/LAC),Children in Need (CIN),Child Protection (CP) and children with EHCP/SEN plans. Live ePEP analytic dashboards, automatic reminder notifications and alerts for attendance officers for daily AM-PM collections.

  • Darktrace Antigena

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Darktrace Antigena is the world’s first proven Autonomous Response technology for the enterprise. The system operates as an AI decision-making framework that neutralises fast-moving and unpredictable attacks in seconds, while sustaining normal operations by design.

  • Bramble Hub Bluestar Software - Confidential Reporting / Integrity Link

    Bramble Hub Limited

    The Confidential Reporting application or Integrity Link as it is also known, is used by law enforcement personnel to submit anonymous feedback to their organisation. The tool ensures that personnel can disclose problems relating to standards of conduct, operational failings, and risks without any fear of recrimination or repercussions.

  • CDW Proofpoint Threat Protection Suite

    CDW Limited

    Proofpoint Threat Protection Suite is made up of Email Protection and Targeted Attack Protection (TAP). Email Protection (SEG Secure Email Gateway) includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP includes sandboxing attachments and URLs as well as URL rewritting and BEC Business Email Compromise detection.

  • Censornet Web Security (SWG)

    CM Security Ltd

    Censornet Web Security safeguards organisations from online threats by filtering web traffic. It offers URL filtering, malware detection, content inspection, and real-time threat intelligence for secure internet usage. Granular control over web access policies ensures compliance and risk mitigation.