Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2472 results found

2472 results found in Lot 2: Cloud software in the category Security

  • LocalGov Drupal - bilingual Welsh / English council web publishing platform - ISO 27001 certified

    S8080 LIMITED

    ISO27001 certified LocalGov Drupal publishing platform for Welsh councils. S8080's LocalGov Drupal self-service web platform securely handles bilingualism, single sign-on integration with forms, transaction and CRM/case management systems, news, events, subsites and devolved publishing. Accessible and mobile friendly, the low-cost LocalGov Drupal platform is designed around Welsh council user's needs.

  • Imprivata Enterprise Access Management - EAM (formally OneSign Single Sign On and confirm ID)

    SOMERFORD ASSOCIATES LIMITED

    Imprivata Enterprise Access Management® provides secure, No Click and password less and multi factor authentication (MFA) for remote access, connected devices, workstations, virtual desktops, critical applications, Electronic Health Records (EHRs), and other systems containing patient data.

  • Tenable Web Application Scanning

    PLANNED LINK LTD

    A cloud-based vulnerability management solution

  • CDW Microsoft Power BI

    CDW LIMITED

    Power BI is a cloud-based business analytics service that enables anyone to connect to, visualize, and analyse data with greater speed, efficiency, and understanding. It connects users to a broad range of live data through easy-to-use dashboards, provides interactive reports, and delivers compelling visualizations that bring data to life.

  • Chrome - Google Arts & Culture

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions provides Google Arts & Culture, a service that offers access to thousands of museum collections, artworks, and cultural artifacts from around the world. This educational tool enhances learning in subjects like history and art, allowing students and educators to explore virtual exhibits.

  • Check Point Cloudguard Code Security

    NETWORK INTEGRATION TECHNOLOGIES LTD

    CloudGuard Code Security provides automated tools that integrate with developers’ tools to detect code vulnerabilities and identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends. With CloudGuard Code Security, organizations can prevent exposing API keys, tokens and credentials, remediating security misconfigurations.

  • ServiceNow Licensing Partner

    INETUM DIGITAL SERVICES UK LIMITED

    ServiceNow licence reseller service and ongoing support to ensure customers drive maximum value from their investment. The ServiceNow platform is a ready‑built foundation that transforms how your business operates and delivers world leading workflow experiences, in an ESM platform, to transform how work gets done across ITSM/CSM/HRSD/ITOM/ITAM/AppEngine/WSD/SecOps/SIR/VR/EC/VA/SAM/HAM/SPM/IRM/GRC/FSM/IH/AI/GBS/Apps

  • IT infrastructure Protection and Monitoring System - ESET Based. Anti-Virus/Malware/Ransomware/Spam.

    BRADLEYSOFT

    ESET PROTECT Platform. Available in 5 Tiers. Advanced Multilayered Protection, Including Antivirus, Anti-Malware/Ransomware, Spam Filtering, Comprehensive Cloud Infrastructure Protection. Secure computers, mobiles, file servers, cloud endpoints. Full disk encryption capabilities on Windows and macOS. Advanced protection for Microsoft 365 & Google Workspace apps. Protects your Cloud Email. Patch Management.

  • Check Point Harmony Email & Collaboration

    Charterhouse Voice & Data

    Provides organizations with complete full-suite protection providing security admins with an easy-to-deploy and manage platform, block sophisticated social engineering attacks such as impersonation, zero-day phishing and Business Email Compromise. Using AI-trained engines. Securing inbound, outbound, and internal emails from phishing attacks inspects the communication’s metadata, attachments, links and language

  • CDW Microsoft Teams Calling Plans

    CDW LIMITED

    A Calling Plan is an add-on telephone service that, when combined with Phone System in Office 365, can become the voice solution for your entire organization. A Calling Plan provides people with a primary phone number and lets them make and receive phone calls.

  • Wiz SaaS

    THE SERVER LABS LTD

    The Wiz Cloud Security Platform, helps development teams to build faster in the cloud by enabling security, dev and devsecops to work together in a self-service model built for the scale and speed of your cloud development Wiz is a single, comprehensive Single Platform for Everything Cloud Security

  • Veracode Security Labs

    TMC3 LIMITED

    Veracode Security Labs shifts AppSec knowledge left, giving developers hands-on training to confidently tackle modern threats by exploiting and patching real code, and applying DevSecOps principles to deliver secure code on-time. Regular assignments, progress reports, and leaderboard foster healthy competition, and encourage developers to continuously improve their secure coding skills.

  • Computacenter - Splunk Threat Detection Investigation and Response Suite

    Computacenter (UK) Ltd

    Use any or all of Splunk’s Security products and services together to provide a unified security operations solution. On top of Splunk Enterprise or Splunk Cloud, combine Enterprise Security (SIEM), Mission Control, Splunk Attack Analyser (SAA), Splunk Threat Intelligence Management (TIM), Splunk SOAR, and Splunk UBA.

  • Secris - automated vulnerability scanner

    Made Purple Ltd

    Secris is a comprehensive Cyber Security tool that automatically finds risks and vulnerabilities in your systems and infrastructure. Our Automated Vulnerability scanner monitors and secures your external endpoints, catalogue system inventory and software and automatically check them against current CVE's and emerging threats from a range of sources.

  • Exchange Online Plan 1

    PHOENIX SOFTWARE LIMITED

    Exchange Online Plan 1 provides business class email, contact management, calendaring services. 50Gb per user. Access using the rich Outlook client, tablet / phone applications or internet browsers. Includes anti-malware and spam filtering. Interact with Shared Mailboxes, Group Mailboxes, Public Folders, OneDrive, Office, 3rd party applications and more.

  • ManageEngine Endpoint Central: Cloud-based Unified Endpoint Management and Security Solution

    Zoho Corporation Limited

    Endpoint Central is an endpoint management and security solution for a company's IT infrastructure. It manages servers, desktops, laptops, and devices across multiple OSs from a single console. Crafted for SMBs and enterprises alike, it simplifies and automates routine tasks while securing against cyberattacks with its integrated endpoint protection suite.

  • Forescout - EyeSight / EyeControl / EyeInspect

    Barrier Networks

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assests.

  • Proact Security Incident and Event Management (Microsoft Sentinel)

    Proact IT UK Limited

    Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).

  • Amazon WorkSpaces

    SOFTCAT PLC

    Amazon WorkSpaces offers you an easy way to provide a secure, managed, cloud-based virtual desktop experience to your end-users. Amazon WorkSpaces provides a fully managed service. With Amazon WorkSpaces, you can deliver a high-quality portable desktop, and applications, to your users on the device of their choice.

  • Check Point Harmony SaaS

    LRQA

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.

  • EIS (Cantium) Redstor

    Cantium Business Solutions

    Redstor, with EIS (the trading arm of Cantium), is a globally trusted provider of cloud-native data management technology. The solutions enable organisations to swiftly recover and access data, securely archive older data, analyse data trends, and ensure compliance with regulations such as GDPR through e-discovery for data subject access requests.

  • SQL Server 2012 Extended Security Updates

    NAK Consulting Services Ltd

    Extended Security Updates for SQL Server 2012

  • Access TEC Oysta

    The Access Group

    Access Mobile TEC solutions include personal alarms with location-based technology built in therefore offering individuals support both inside and outside the home. Different form factors are available including a pendant alarm, mobile app and a wrist-worn watch. Settings are configurable to each individual depending on their telecare needs.

  • Mimecast Perimeter Defence Plan (Zone 1)

    Planet IT

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Stone Cloud Enterprise Network Security - Cisco Duo Multi Factor Authentication

    Stone Technologies Limited trading as Converge Technology Solutions

    Stone utilises Cisco Duo to provide Multi Factor Authentication. Duo’s Trusted Access platform is a holistic security solution that reduces your risk of a data breach caused by compromised credentials, known vulnerabilities and/or exploits.

  • ProxyAddress

    ProxyAddress

    ProxyAddress is a unique, award-winning service providing secure 'proxy' address details to those facing the instability of homelessness. A ProxyAddress helps to establish consistency and can be used like a normal address to securely access vital services and support, regardless of location or how often an individual moves.

  • Barrier Networks Zero-Trust Access Control & IoT Security (Fortinet FortiNAC)

    Barrier Networks

    Network Access Control (NAC) is a critical component in the modern-day network. NAC offers organisations the ability to deploy Zero Trust Network Solutions, Secure SD Branch Deployments and ensure IoT, BYOD and user devices are profiled, only allowed to access approved resources and periodically reviewed for compliance.

  • Heimdal Security - Unified Threat Platform

    Network Utilities (Systems) Ltd

    One Platform, One Agent, Complete Protection From ransomware and insider threat, to business compromise and anything in between, Heimdal™ protects your operational integrity by stopping even the most sophisticated cyberattacks from day one. Bundle includes: Threat Prevention, Patch & Asset Management Next-Gen Antivirus & MDM

  • Mimecast Cybergraph

    Planet IT

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • altSRD - Secure Remote Desktop

    ALTIATECH LTD

    altSRD provides right-sized virtualized desktop solutions that balances security, productivity and value - Parallels RAS (remote application server): a flexible virtual application and desktop delivery solution. Parallels Secure Workspace (formerly Awingu): a highly secure and auditable access to your desktops, company files as well as legacy, web, and SaaS apps.