Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1728 results found

1728 results found in Lot 2: Cloud software in the category Security risk management

  • Collibra

    Billigence

    Collibra provides a solution covering data governance, stewardship, metadata processing, business glossary, data dictionary and catalogue. This enables business users to find their data easily, understand where it has come from and be able to trust the quality of the data. Collibra only processes metadata: data about the data.

  • Forcepoint Data Guard

    CHESS ICT LIMITED

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • Caveris ICAS (Information & Cyber Assurance Suite)

    CIRRO LIMITED

    Organisations are increasingly dependent on third-parties to deliver. Our approach to this Governance Risks and Compliance (GRC) is based on Caveris ICAS. This allows you to Automate your Third-Party Risk Assessment Lifecycle on a single user friendly platform so you can identify, track and remediate issues faster.

  • CheckPoint CloudGuard Code Security (Spectral)

    BYTES SOFTWARE SERVICES LIMITED

    CloudGuard Code Security provides automated tools that integrate with developers’ tools to detect code vulnerabilities and to identify secrets and misconfigurations in the code before deployment, preventing unauthorized use. With Code Security, organizations can prevent exposing API keys, tokens and credentials, in addition to remediating security misconfigurations. bssgc

  • CDW CyberArk Conjur Secrets Manager Enterprise

    CDW LIMITED

    Control, manage and audit non-human privileged access for applications, including commercial off-the-shelf, in-house developed applications and applications developed using DevOps tools and methodologies -- across on premises, hybrid, cloud and containerized environments.

  • Tenable Identity Exposure (formerly Tenable.ad)

    SOFTCAT PLC

    Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.

  • Information Asset Register

    TMC3 LIMITED

    Data Mapping and Information Asset Register by OneTrust. The platform enables organisations to identify data flows and information assets to establish and maintain an accurate Information Asset Register. Seamlessly connect and discover all data systems utilising flexible intake methods including pre-built connectors, expert-crafted questionnaires, and bulk import tools.

  • Trustmarque Palo Alto Cortex XDR

    TRUSTMARQUE SOLUTIONS LIMITED

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivalled security and operational efficiency.

  • KnowBe4 - Email Phishing and Security Awareness Training

    SOMERFORD ASSOCIATES LIMITED

    KnowBe4 empowers your workforce to make smarter security decisions every day. Over 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk. KnowBe4 builds a human layer of defence so organisations can fortify user behaviour with new-school security awareness and compliance training.

  • Occamsec InCenter Penetration Testing, Threat Hunting Platform.

    Barrier Networks

    Incenter SaaS platform : continuous penetration-testing, automation and human testers, continually test for vulnerabilities in applications, infrastructure and software. Penetration-Testing: Ethical hacker team providing penetration testing to find vulnerabilities and risk. Threat Hunting: Consulting looking for IOC within organisation. "Teaming": Assessing attack vectors (Red), Defensive team (Blue) and mix (Purple)

  • Proofpoint Advanced Package

    INTEGRITY360 LIMITED

    Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.

  • Konsolute Kolumbus - Data Discovery Tool

    KONSOLUTE

    Enhance your data analysis and discovery with Konsolute Kolumbus, a powerful tool designed for discovering, visualising, and analysing organisational data. Kolumbus simplifies understanding large datasets, supports compliance, and aids in effective data migration by identifying key data elements and structuring them through intelligent taxonomy creation.

  • ESET Protect Complete

    INTEGRITY360 LIMITED

    Our combination of spam filtering, anti malware scanning, anti phishing and cloud sandboxing helps protect your organization against infections and targeted attacks, as well as blocking new, never-before-seen types of threats, especially ransomware.

  • Salesforce - Public Sector Solutions Cloud

    SKYFLO DIGITAL LTD

    Single platform designed to help governments to serve the people faster. Get value quickly with purpose-built data, integration, automation, AI, analytics, UX for public sector. Out-Of-The-Box capabilities to manage citizen services and benefits, deliver authorisations, manage rules and compliance, ensure safety and justice, recruit, onboard, develop public sector employees. SFDC2024GC14

  • Mimecast Cybergraph

    Cyberlab

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • Netapp - Cloud Data Sense

    SOFTCAT PLC

    Cloud Data Sense is a data mapping and classification tool, across your hybrid cloud and on-premise environment. Driven by our powerful AI algorithms, we provide automated controls and reporting so that you can always stay on top of your data

  • Unified Recording from Virgin Media O2 Business

    Virgin Media Business

    Unified Recording is a secure, scalable and hosted recording service that can help you meet regulatory requirements, reduce costs and optimise workflows. Buyers can record, review and audit calls&texts from your O2 mobile devices and collaboration tools, whether that’s Teams, Zoom or Webex. All from our easy to use portal.

  • IRIS Intelligence Governance, Risk, and Compliance (GRC) System

    IRIS INTELLIGENCE LIMITED

    IRIS Intelligence Governance, Risk, and Compliance (GRC) System helps organisations manage uncertainty, achieve targets and increase awareness and compliance across the organisation. It facilitates the design and implementation of control frameworks, risk mitigation, and the creation and roll-out of policies. The system supports ISO27000, ISO31000, NIST among others.

  • CrowdStrike Falcon Exposure Management

    INTEGRITY360 LIMITED

    CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Mimecast Cybergraph

    INTEGRITY360 LIMITED

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • Log Management ( FortiAnalzyer)

    FULLPROXY LIMITED

    FortiAnalyzer is a centralized logging, analytics, and reporting appliance. It's designed to provide organizations with comprehensive visibility into their network security infrastructure. It collects, analyzes, and correlates log data from Fortinet security devices, including firewalls, switches, access points, and more, to help organizations monitor and manage their security posture effectively.

  • Netwrix Auditor

    INTEGRITY360 LIMITED

    Detect security threats, prove compliance and increase IT team efficiency with IT audit software from Netwrix

  • Application Security Services

    SALUS DIGITAL SECURITY LIMITED

    Gathering independent assurance of cloud service provision and operation against legal, Government, and Industry standards

  • Egress Protect - Email Encryption

    S3 Ltd

    Egress Protect guards against data breaches by reducing human activated risk. Easy to use, certified encryption with flexible user controls and automatic encryption options supports your security policy.

  • Call Centre Case Management

    CLARITAS SOLUTIONS LIMITED

    Empowers users to have complete control of your customers journey. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Software Development

    IT LABS D.O.O.E.L.

    Our cloud software development service encompasses the entire software development lifecycle, from initial concept and design to deployment and maintenance. These services are tailored to the unique requirements of clients. We are specialized in delivering software solutions in: EdTech, FinTech, Automotive, E-commerce, Gaming & Entertainment, Business Consulting, Legacy &Government projects.

  • CyberArk CyberArk Conjur Secrets Manager Enterprise

    INTEGRITY360 LIMITED

    Control, manage and audit non-human privileged access for applications, including commercial off-the-shelf, in-house developed applications and applications developed using DevOps tools and methodologies -- across on premises, hybrid, cloud and containerized environments.

  • 2FA API solution

    BOOMERANG I-COMMS LTD

    Boomerang delivers a robust two-factor authentication (2FA) messaging service, bolstering account security with one-time passcode (OTP) verification. Our solution equips developers with seamless integration tools for heightened protection against unauthorized access. Leveraging Boomerang's platform fortifies accounts, reducing risks and ensuring compliance with ISO 27001, Cyber Essentials, and Cyber Essentials Plus.

  • Voixtel Cloud Telephony Software and Services

    VOIXTEL

    We are an experienced cloud telecoms provide offering bespoke solutions tailored to meet your needs. We offer virtual telephone numbers that are not tied to physical hardware with intelligent functionality which enables callers to contact organisations in the most efficient way, providing targeted solutions for niche applications.

  • boxxe Tenable Web Application Scanning

    BOXXE LIMITED

    Simple, scalable and automated vulnerability scanning for web applications.