Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1725 results found

1725 results found in Lot 2: Cloud software in the category Security risk management

  • Sentinel Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    We offer comprehensive breach detection and response, powered by Microsoft Sentinel, delivered by our 24/7 UK-based Security Operations Centre. Our service uses cloud-native SIEM and SOAR capabilities for rapid detection, investigation, and response to threats across cloud, hybrid, and on-premises environments, supported by expert analysts and automation.

  • Palo Alto Cortex XSOAR

    SOFTCAT PLC

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • CrowdStrike Falcon Insight Extended Detection & Response (XDR)

    SOFTCAT PLC

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Sophos Firewall

    CHESS ICT LIMITED

    Sophos XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Computacenter - Proofpoint Core P0

    COMPUTACENTER (UK) LIMITED

    Combat email threats comprehensively with end-to-end solutions, spanning detection to response. Automate abuse mailbox handling to swiftly eliminate user-flagged phishing emails. Tackle diverse threats like phishing, BEC, supplier fraud, ransomware, and malware. Enhance visibility into attack targets, methods, user responses, and compromises for proactive defense strategies.

  • Proofpoint P1 Bundle

    BYTES SOFTWARE SERVICES LIMITED

    Train end users to be more resilient against threats they receive. Augment threat protection with a robust security awareness training programme that integrates with your email security controls and includes phishing simulations, cultural and knowledge assessments, comprehensive training and awareness materials. bssgc

  • Cloudflare Zero Trust Network Access (ZTNA)

    Cloudflare, Inc.

    Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.

  • Rapid7 - Insight AppSec

    SOFTCAT PLC

    InsightAppSec part of Rapid7's security suite, providing Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are getting complex, utilizing JavaScript frameworks, like React and Angular, that provide a richer experience and easier path to full feature sets, but also present challenges to secure those apps.

  • NAZAR X Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    Detecting and Preventing breaches. XDR / MDR / SIEM / SOC. Monitoring and detection as a fully managed Service

  • Check Point Harmony Endpoint

    SOFTCAT PLC

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • CDW AvePoint Policies for Microsoft 365

    CDW LIMITED

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.

  • Identity and Access Management (IAM) Advanced

    SAPPHIRE TECHNOLOGIES LIMITED

    An Identity and Access Management (IAM) system is designed to be a single solution for managing user access and permissions within an organisation’s environment. Covering solutions for Privileged Account and Session Management (PASM), Privilege elevation and delegation management (PEDM), Secrets Management and Cloud Infrastructure entitlement management (CIEM).

  • Multi-Agency Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empower users to have complete control of managing multi-agency working. Secure, scalable, with UK GDPR and DPA Pt3 customer special terms. Hosted in UK it offers quick and flexible deployment with no upfront costs. Full multi-agency working technology platform providingg full UK data sovereignty for efficient, sustainable, and legal operations.

  • Tenable One - Standard

    SOFTCAT PLC

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance. Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory"

  • Digital and Qualified Signatures, eSeals and Time stamping Services

    GMO GLOBALSIGN LIMITED

    GlobalSign's EU eIDAS compliant eSignature services, DSS, QTS and QSS, provides identity-based digital eSignatures and eSeals for your employees and Organisation documents. Simply connect our API to you DMS, or use our ready-integrations with Document Signing platforms, and we'll sign document hashes and embed timestamping for legally recognised eSignatures.

  • Cloudlake Backup for M365

    AUTODATA PRODUCTS LIMITED

    Cloudlake Backup for M365 (powered by Veeam) protects organisations from undetected deletions, corruption and both internal and external threats. Our unique model allows you to protect Exchange, Teams, Sharepoint and OneDrive for Business against any event, whilst ensuring you only purchase exactly what you need with no wasted expense.

  • Check Point Harmony Endpoint

    CHARTERHOUSE VOICE & DATA LIMITED

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Cyber Resilience Training Platform (SaaS)

    CYBEXER (UK) LTD

    The Cyber Resilience Training Platform (SaaS) delivers a cloud-based solution for organizations to practice cyber resilience. It provides scalable, realistic simulations tailored to business and public sector cyber threats, emphasizing response and recovery to ensure organizations can withstand and quickly rebound from cyber incidents.

  • Check Point Harmony Mobile

    CHARTERHOUSE VOICE & DATA LIMITED

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • Web,Mobile Design and IT Support Services

    DBAAS LTD

    We provide the cost effective solutions with the migration of existing system&technological upgrade with a fresh UI for better look & feel. Technologies that we serve RESTful Web Services,Angular, Node JS, HapiJs, Laravel, Codeigniter,Python.Technologies that we serve @ DBaaS Native Applications - Android, iOS & Hybrid Applications - Ionic, Flutter.

  • CDW CrowdStrike Application Security Posture Management

    CDW LIMITED

    CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • CheckPoint Harmony Email & Collaboration

    BYTES SOFTWARE SERVICES LIMITED

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss. bssgc

  • Tenable Active Directory Security

    PHOENIX SOFTWARE LIMITED

    Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.

  • Tenable Vulnerability Management

    SAPPHIRE TECHNOLOGIES LIMITED

    Risk-based view of your identified vulnerabilities to identify, investigate and prioritise what is most critical. Managed in the cloud, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time assessment of your organisation. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and prioritise remediations

  • Sentinel Spaces

    YUDU Sentinel

    Sentinel Spaces is a new major Incident management platform that allows Spaces to be prepared for specific threats, ready for activation. Crisis teams at multi-site locations can run local incidents with central oversight. Tools include, mass notification, secure chat, conferencing, document distribution, task management, decision and audit logs.

  • Cybersecurity Awareness Training and Simulated Phishing

    Bob's Business Ltd

    A fully managed service including cybersecurity awareness training, policy management, and delivery of simulated phishing campaigns. Human Vulnerability Assessments and cognitive-behavioral learning. Delivery of bespoke training packages and cyber masterclasses. Providers of a learning management system.

  • Sophos Central Intercept X Advanced with XDR

    BYTES SOFTWARE SERVICES LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visibility across other 3rd party security vendors. bssgc

  • ProvetoVote

    AVOCO SECURE LIMITED

    ProveToVote (P2V) is a revolutionary solution designed to streamline and simplify the often challenging task of identity verification during the voting process. Avoco’s mission is to make this essential voting element accessible and less burdensome for everyone involved.

  • Forescout NetSec Core

    CHESS ICT LIMITED

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assets.

  • Collibra

    Billigence

    Collibra provides a solution covering data governance, stewardship, metadata processing, business glossary, data dictionary and catalogue. This enables business users to find their data easily, understand where it has come from and be able to trust the quality of the data. Collibra only processes metadata: data about the data.