Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2472 results found

2472 results found in Lot 2: Cloud software in the category Security

  • Forcepoint Data Loss Prevention (DLP)

    Cyberlab

    Follow your data across networks and devices—both at rest, in motion and in use. Create and enforce policies that provision the access and movement of data to prevent data breaches and help ensure compliance with Forcepoint Data Loss Prevention (DLP).

  • Proofpoint Tessian ICES

    PHOENIX SOFTWARE LIMITED

    Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • Verdict Cyber Security Analysis Service

    ACTIONABLE LTD

    Verdict Cyber is the latest generation cyber security analysis platform. Verdict is an automated cyber security App Store using analytics including deep learning AI to provide users with the most authoritative cyber security verdict about any file type. Verdict enable experts and beginners to perform file analysis.

  • Forescout Threat Detection and Response (XDR)

    BYTES SOFTWARE SERVICES LIMITED

    Forescout XDR converts telemetry and logs into high fidelity, SOC-actionable probable threats. bssgc

  • Agent Assisted Payments

    ECKOH UK LIMITED

    A PCI Level 1 compliant agent-assisted payment solution that enables your customer to make secure payments across all channels including phone and chat, when speaking with an agent. CallGuard allows for full de-scoping for Card Not Present (CNP) payments allowing our clients to certify for PCI using SAQ-A or SAQ-D.

  • Behavioural Solutions – Sentiment Analysis

    VIABLE DATA LTD

    Viable Data provide behavioural solutions including sentiment analysis to detect individual behaviour and emotion, well-placed for immigration, borders and law enforcement and security services based organisations.

  • CheckPoint Harmony Mobile

    BYTES SOFTWARE SERVICES LIMITED

    A Complete threat defence solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience. bssgc

  • Nutanix Disaster Recovery Planning service

    HYPER TALENT SOLUTIONS LTD

    Nutanix Disaster Recovery Planning Service offers robust strategies to safeguard critical data and applications against unforeseen events. It focuses on creating resilient, rapid recovery solutions, minimizing downtime and data loss. This service ensures business continuity through customized recovery plans, leveraging advanced technologies for efficient and reliable disaster response.

  • Proofpoint Security Awareness Training

    SOFTCAT PLC

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • Real Time Passenger Information (RTPI) Lite using Bus Open Data Service (BODS)

    R2P Systems UK Ltd

    BODS provides us with vehicle position and schedule information that is connected to our system via a secured API. The main advantage of this system is the ability to produce real-time predictions across multiple bus operators and various localities.

  • Case Management System

    CLARITAS SOLUTIONS LIMITED

    Case Management System empowers case managers to support customers at every stage of their journey. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • MTI Tenable One Exposure and Vulnerability Management Platform

    MTI TECHNOLOGY LIMITED

    Tenable provides a class leading vulnerability scanning and management solution, providing the tools and functionality to deliver vulnerability assessments, and the insights necessary to advance your security posture and safeguard your business. It is continually updated with new vulnerability definitions and checks, zero-day research, and compliance benchmarks.

  • FourNet (4net) Secure Mail

    4net Technologies Ltd

    FourNet's Secure Mail provides robust email security with anti-spam, anti-malware and phishing protection. It ensures secure communications through advanced threat detection, data loss prevention and identity-based encryption, enhancing email integrity and compliance across your organisation.

  • Drupal Development Services, Drupal Support and Maintenance Services

    JEDEX Ltd

    Drupal 10 development, consultancy and ongoing support services. Tailored solutions to meet client requirements using Drupal and other open source platforms. Software/web development, content management, agile project management, migration, search, discovery/analysis, security, patching upgrades, Drupal 7/8/9. We develop digital strategies and provide a team of experts to deliver tailored solutions.

  • Grant Thornton - Cloud Security Assessment

    GRANT THORNTON UK LLP

    Security assessments for a range of cloud environments such as Amazon Web Services (AWS), Microsoft Azure and Google Cloud to review the design, processes and implementation of your controls and perform technical validation to provide a view on any vulnerabilities and risks. .

  • Palo Alto Prisma Cloud

    PHOENIX SOFTWARE LIMITED

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.

  • Check Point CloudGuard Cloud Security Posture Management (CSPM)

    LRQA

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.

  • UK Engage Secure online nominations

    PRINT IMAGE NETWORK LTD (Trading as UK Engage)

    Our secure online nomination solution is used for board & council/committee elections. It’s easy to use and flexible. With encryption and email confirmation embedded, our solution makes it easy undertaking candidate nomination processes. Our system can be branded with a client’s logo, colour scheme and imagery to increase engagement.

  • Forecpoint / Everfox Data Diodes

    SOFTCAT PLC

    Designed for highly secure environments, Data Diodes implement key stages to UK National Cyber Security Centre’s (NCSC) design patterns for Safely Importing / Exporting Data. Enables rapid, uni-directional, automated transfer – via 1Gb or 10Gb fibre link- of highly complex data segmenting and protecting networks, devices, and other digital assets.

  • Teleware ConnectPro for Microsoft Teams

    Business Systems (UK) Ltd

    ConnectPro is a fully integrated Microsoft Teams advanced call handling application, that allows users to create and manage call queues and call handlers within Teams. With real time statistics and integrations in to 3rd party systems such as CRM, and meaningful data insights with integration into PowerBI.

  • Delinea Secret Server Cloud Privilege Access Management

    PROOFID LIMITED

    Delinea Secret Server Cloud is an online password manager hosted in Azure, a highly secure and available platform. Secret Server has layers of built-in security with easy access management for IT admins, robust segregation of role based duties, AES 256 bit encryption, out of the box reports to demonstrate compliance.

  • CrowdStrike Falcon Identity Threat Detection & Protection

    INTEGRITY360 LIMITED

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • Check Point Harmony Email and Collaboration

    SEP2 LIMITED

    Provides organizations with complete full-suite protection providing security admins with an easy-to-deploy and manage platform, block sophisticated social engineering attacks such as impersonation, zero-day phishing and Business Email Compromise. Using AI-trained engines. Securing inbound, outbound, and internal emails from phishing attacks inspects the communication’s metadata, attachments, links and language

  • Netwrix Stealth Intercept

    INTEGRITY360 LIMITED

    Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.

  • CDW CrowdStrike Falcon® Counter Adversary Operations

    CDW LIMITED

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.

  • UK Sovereign Digital Sensitivity Review Service - SVGC

    NINE23 LTD

    UK Sovereign managed service for hosted Digital Sensitivity Review (DSR) Toolset processes digital files to ensure sensitive content is redacted. DSR toolset with bespoke development and AI logic to pre-identify sensitivities and indicate redaction suggestions for rapid Curator review, automatically packaging files with metadata for transfer to archive or consumer.

  • CDW Mimecast Perimeter Defence Plan (Zone 1)

    CDW LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • boxxe Mimecast Cybergraph

    BOXXE LIMITED

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • CyberArk Workforce Identity

    SOFTCAT PLC

    CyberArk workforce Identity is an IDaaS that offers full featured identity lifecycle & access management; it includes adaptive MFA/SSO and unique extra controls such as a Password Manager, adaptive Workstation MFA, Secure Browser and Web session protection

  • OneTrust Certification Automation

    Oyster Information Management Solutions Limited

    The Certification Automation suite from OneTrust allows you to build and manage an entire InfoSec program including the ability to define security policies, provide proof of compliance. The product suite can track implementation of security controls and prepare for security audits like SOC 2, ISO 27001 and more.