Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1557 results found

1557 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Tenable Lumin

    INTEGRITY360 LIMITED

    Calculate, communicate and compare your cyber risk.

  • MEAFuse

    Issured Ltd

    Advancement in digital technology increases risk to the provenance and security of digital material, more opportunities for information to be compromised and its quality, accuracy and reliability open to challenge. Mea: Fuse, a blockchain and SHA-256 enabled immutable record of any digital evidence or intelligence from your own private systems.

  • OPSWAT - MetaDefender Core

    NETWORK INTEGRATION TECHNOLOGIES LTD

    OPSWAT's MD-Core consists of Multiscannng, Deep CDR, Filescan (Sandbox), DLP, File Based Vulnerability, Software Supply Chain for the protection against malware threats. OPSWAT has complimentary products and features such as Managed File Transfer (aka Vault), Diode Technology (CDS, IDG), and an umber of Access and IOT Solutions.

  • FusionGraph

    Resulting Ltd

    FusionGraph is a cloud based solution to enable SAP customers to build a roadmap and business case to move from ECC to S/4 HANA. Designed for Architects, SAP consultants and business leaders as a knowledge repository.

  • Sophos Managed Detection and Response Complete (MDR) Server

    Chess CyberSecurity Ltd

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Tenable Vulnerability Management (formerly Tenable.io)

    Softcat Limited

    Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.

  • Vulnerability Management Solution

    GET SWARMS LIMITED

    GetSwarms provides an intuitive, cloud-based Vulnerability Management system that is easy to set up and deploy. It conducts comprehensive scans of your network, assets, and the deep web to identify potential security risks. The system also ensures compliance with industry standards, helping organizations protect their infrastructure and data effectively.

  • Protective DNS Local Reporting

    PEGASUS LABS PTY LTD

    When using a Protective or Filtering DNS service, these only identify which DNS queries were blocked not the source device on your local network. This service allows you to automatically track down and report on compromised devices inside your network, including IP address and device name.

  • Recorded Future Threat Intelligence

    Sapphire

    Criminals often impersonate an organisation and many citizens aren't aware that .gov.uk is the norm for public sector organisations. This service monitors for similar web sites using non authorised domains and provided optional take down services

  • Check Point Harmony SASE

    Softcat Limited

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • ElectionsPro

    FCS SOFTWARE SOLUTIONS LIMITED

    ElectionsPro provides local authorities with access to a secure web-based, fully hosted, legislatively compliant electoral management software solution that enables electoral administrators to manage all aspects of electoral services including Individual Electoral Registration, the annual canvass and all elections and referendums.

  • Secure Azure Sandbox for UK Government: Air-Gapped Data Science & Processing

    WR LOGIC LIMITED

    Our service offers a secure, air-gapped sandbox for data science and processing, tailored for national security departments. It ensures maximum data isolation and protection using Azure Stack Hub, Azure Synapse Analytics, Azure Data Factory, and Azure Databricks, among other technologies.

  • Threat Intelligence - Recorded Future

    Brookcourt Solutions

    Recorded Future is the most comprehensive and independent threat intelligence cloud platform. They enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.

  • Centripetal CLEANInternet

    4 DATA SOLUTIONS LIMITED

    CleanINTERNET® is an intelligence-powered security solution that leverages the world's most comprehensive Threat Intelligence (TI) database combined with a team of TI operatives to provide an unprecedented level of protection at the perimeter. An order of magnitude faster than NGFWs, CLEANInternet is essential as part of your Secure Boundary strategy.

  • Fortra's Classifier Suite FCS (Formerly Boldon James) - From HANDD Business Solutions

    HANDD Business Solutions

    Fortra's Classifier Suite FCS (Boldon James) allows you to organise and label data according to sensitivity and importance, across platforms and devices. Protect sensitive information by assigning persistent metadata labels like "Confidential" or "Public", alongside rich context labels. FCS aids in enforcing data security policies and ensures compliance with regulations.

  • Spirion DSPM Data Discovery & Classification - From HANDD Business Solutions

    HANDD Business Solutions

    Spirion's Sensitive Data Platform (SDP) provides Privacy Grade™ data discovery and purposeful classification in a highly scalable SaaS hybrid architecture, that thoroughly scans both on-premises endpoints/servers and cloud repositories at enterprise scale. It automatically discovers, classifies, and remediates almost any form of sensitive data anywhere on-premises, the cloud, and endpoints.

  • Heimdal Security - Next-gen Antivirus, Ransomware Encryption Protection, Patch Manager & 24/7 SOC

    BITZ 'N' PC'Z LIMITED

    Heimdal Security elevates your digital defense, seamlessly integrating powerful anti-virus and firewall capabilities with cutting-edge ransomware protection and vulnerability management, ensuring unparalleled security for your data and systems. This bundle includes: • Next-Gen Anti-Virus, Firewall & MDM • Ransomware Encryption Protection • Patch & Asset Management • 24/7 Monitoring

  • Sophos Cloud Optix

    Bytes Software Services

    "Sophos Cloud Optix, the Sophos Cloud Security Posture Management solution, proactively reduces business risk from unsanctioned activity, vulnerabilities, and misconfigurations across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform public cloud environments." bssgc

  • ESET and ESET M-EDR

    Grove Information Systems

    ESETs combination of spam filtering, anti-malware scanning, anti-phishing and cloud sandboxing helps protect organisations against infections and targeted attacks, as well as blocking new, never-before-seen types of threats, especially ransomware.

  • Cloud Based Identity as a Service Multi-Factor Authentication

    Entrust Datacard (Europe) Limited

    Entrust’s Cloud-Based Multi-Factor Authentication Platform, Identity as a Service, empowers organizations and users to secure access to cloud, legacy and on-premise apps while safeguarding enterprise assets. Identity as a Service is a full-scale, multi-factor authentication platform based in the cloud, suitable for user bases of all sizes.

  • Trust&Assure

    Avoco Secure Ltd

    Avoco’s Orchestration and Decisioning Engine (ODE) is the technology behind Trust&Assure, a service that connects government services to Open Banking data, eWallets, CIFAS and other data sources, to deliver assured identity. Trust&Assure connects to your identity service to provide the data, verification, and deepfake checks to deliver secure services.

  • Automated Vulnerability and Penetration Testing Solution

    Ve3 Global Ltd

    Next-generation vulnerability management and world’s first CREST certified automated penetration testing platform performs around-the-clock penetration testing and predicts attack path scenarios. Low network footprint, discovery of vulnerabilities, testing many attack scenarios in a very short time ensuring an undisrupted network operation. Detailed reports together with proposed remediations of attack vectors.

  • Bilingual umbraco CMS for welsh/english website

    Spindogs Ltd

    Welsh language standards compliant development of mobile optimised, accessible Umbraco websites. Spindogs' Umbraco CMS platform provides bespoke templates for content editors. GDPR compliant Umbraco CMS forms and tagging are out-of-the-box. Umbraco CMS offers version control, integrations, SSO, and multilingualism. Umbraco content management system is open-source, user friendly, and fully customisable.

  • Crypto Analysis

    MISCO TECHNOLOGIES LIMITED

    Explore. Investigate. Take Action. Reactor is the investigation software that connects cryptocurrency transactions to real-world entities. Examine criminal activity, such as the movement of stolen funds, as well as legitimate activity like flash loans and NFT transfers

  • Threat Intelligence - Recorded Future with Tidal Cyber (option)

    Bright Cyber (Voodoo technology LTD)

    Recorded Future is the world's most comprehensive independent threat intelligence cloud platform. This service enables organizations to identify and mitigate threats across cyber, supply chain, physical, and fraud domains with real-time, unbiased, and actionable intelligence. Options include integration with Tidal Cyber for heat mapping threat with defensive controls.

  • ZINC 'SYNAPSE'

    Zinc Digital Business Solutions Ltd

    ZINC 'SYNAPSE' is a intuitive solution crafted for organisations navigating high-risk and complex environments, safeguarding public safety, personnel, brand and assets. With features spanning incident management, mass communications, health and safety oversight, compliance activities, and security patrols, SYNAPSE consolidates operations into a unified platform.

  • Ultima AvePoint Compliance Guardian

    Ultima Business Solutions Ltd

    Identify and automatically manage risks associated with content across structured and unstructured data in cloud and on-premise systems. Satisfy internal or external requirements for information management and data governance, including GDPR and the Data Protection Act. Complete DSARs (Data Subject Asset Requests) and Right to be Forgotten requests quickly

  • Crowdstrike Falcon Complete MDR Licences

    MONDAS CONSULTING LTD

    Purchase Crowdstrike Falcon MDR licences to utilise the power of the Crowdstrike Falcon Complete MDR tool to protect your endpoints from Cyber Security threats. Receive 24x7 monitoring and response services from a team of Crowdstrike experts searching for signs of malicious activity on your network.

  • Palo Alto Cortex XDR

    Xpertex

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency.

  • Microsoft SharePoint

    Th3rd Curve Ltd

    Collaborative web platform for document management, real-time collaboration, and data storage. Facilitates internal and external team collaboration on various devices. Ideal for intranet creation, business processes, and project management. Offers both out-of-the-box and tailored solutions for diverse business needs. Can implement enhanced security features to ensure data protection and compliance.