Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1698 results found

1698 results found in Lot 2: Cloud software in the category Security risk management

  • Unified Recording from Virgin Media O2 Business

    VIRGIN MEDIA BUSINESS LIMITED

    Unified Recording is a secure, scalable and hosted recording service that can help you meet regulatory requirements, reduce costs and optimise workflows. Buyers can record, review and audit calls&texts from your O2 mobile devices and collaboration tools, whether that’s Teams, Zoom or Webex. All from our easy to use portal.

  • IRIS Intelligence Governance, Risk, and Compliance (GRC) System

    IRIS INTELLIGENCE LIMITED

    IRIS Intelligence Governance, Risk, and Compliance (GRC) System helps organisations manage uncertainty, achieve targets and increase awareness and compliance across the organisation. It facilitates the design and implementation of control frameworks, risk mitigation, and the creation and roll-out of policies. The system supports ISO27000, ISO31000, NIST among others.

  • CrowdStrike Falcon Exposure Management

    INTEGRITY360 LIMITED

    CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Mimecast Cybergraph

    INTEGRITY360 LIMITED

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • Log Management ( FortiAnalzyer)

    FULLPROXY LIMITED

    FortiAnalyzer is a centralized logging, analytics, and reporting appliance. It's designed to provide organizations with comprehensive visibility into their network security infrastructure. It collects, analyzes, and correlates log data from Fortinet security devices, including firewalls, switches, access points, and more, to help organizations monitor and manage their security posture effectively.

  • Netwrix Auditor

    INTEGRITY360 LIMITED

    Detect security threats, prove compliance and increase IT team efficiency with IT audit software from Netwrix

  • Application Security Services

    SALUS DIGITAL SECURITY LIMITED

    Gathering independent assurance of cloud service provision and operation against legal, Government, and Industry standards

  • Egress Protect - Email Encryption

    Security Software Solutions Ltd (S3 Ltd)

    Egress Protect guards against data breaches by reducing human activated risk. Easy to use, certified encryption with flexible user controls and automatic encryption options supports your security policy.

  • Call Centre Case Management

    CLARITAS SOLUTIONS LIMITED

    Empowers users to have complete control of your customers journey. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Software Development

    IT LABS D.O.O.E.L.

    Our cloud software development service encompasses the entire software development lifecycle, from initial concept and design to deployment and maintenance. These services are tailored to the unique requirements of clients. We are specialized in delivering software solutions in: EdTech, FinTech, Automotive, E-commerce, Gaming & Entertainment, Business Consulting, Legacy &Government projects.

  • CyberArk CyberArk Conjur Secrets Manager Enterprise

    INTEGRITY360 LIMITED

    Control, manage and audit non-human privileged access for applications, including commercial off-the-shelf, in-house developed applications and applications developed using DevOps tools and methodologies -- across on premises, hybrid, cloud and containerized environments.

  • 2FA API solution

    BOOMERANG I-COMMS LTD

    Boomerang delivers a robust two-factor authentication (2FA) messaging service, bolstering account security with one-time passcode (OTP) verification. Our solution equips developers with seamless integration tools for heightened protection against unauthorized access. Leveraging Boomerang's platform fortifies accounts, reducing risks and ensuring compliance with ISO 27001, Cyber Essentials, and Cyber Essentials Plus.

  • Voixtel Cloud Telephony Software and Services

    VOIX TELECOM LTD

    We are an experienced cloud telecoms provide offering bespoke solutions tailored to meet your needs. We offer virtual telephone numbers that are not tied to physical hardware with intelligent functionality which enables callers to contact organisations in the most efficient way, providing targeted solutions for niche applications.

  • boxxe Tenable Web Application Scanning

    BOXXE LIMITED

    Simple, scalable and automated vulnerability scanning for web applications.

  • Decommissioning as a service (DaaS) On-site Data Bearing Media Destruction

    NETWORK 2 SUPPLIES LIMITED

    Data destruction and disposal/recycling of legacy equipment is central to managing a system migration to Cloud. N2S offer onsite data destruction for hardware. Certificates listing hard drive serial numbers as proof of destruction are provided. All resultant waste will be disposed of in-line with the WEEE regulations.

  • Check Point Harmony Email and Collaboration

    ITogether

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • Backup, and Disaster Recovery Services with DATTO

    TECHNOLOGY SERVICES GROUP LIMITED

    TSG and Datto provides an industry-leading hybrid on-premise & cloud backup & DR solution. This technology provides localised granular data backup and recovery, with a secondary cloud backup. This allows you to locally recover servers on the appliance or to recover your servers in the Datto cloud in a disaster.

  • Penetration Testing Solution

    GET SWARMS LIMITED

    Penetration Testing Solution offered by Get Swarms provides comprehensive assessments to bolster organisation security. By simulating real-world cyber-attacks, we uncover vulnerabilities in networks and applications, enabling proactive defense measures. Detailed reports are produced together with proposed remediations to support ongoing cyber defence strategy.

  • Qualys Vulnerability Scanning

    ZENZERO SOLUTIONS LIMITED

    Comprehensive vulnerability scanning including internal, external, network, application, compliance and agent-based scanning. Powered by Qualys, our scanning provides continuous assurance, identifies potential security weaknesses and threats across assets and provide actionable remediation advice.

  • CDW Sophos Managed Detection and Response Complete (MDR) Server

    CDW LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Proofpoint Archive

    BYTES SOFTWARE SERVICES LIMITED

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house. bssgc

  • Netwrix Privilege Secure

    BYTES SOFTWARE SERVICES LIMITED

    Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance. bssgc

  • Shadow Data Security Posture Management Monitoring

    DIEGESIS LIMITED

    Guardium Insights DSPM allows you uncover hidden data, analyse data flows and identify data security vulnerabilities. Get a 360 degree view of all your sensitive data in cloud by discovering shadow data, analysing flow of data and uncovering posture vulnerabilities.

  • Cisco Secure Access Service Edge (SASE)

    SOFTCAT PLC

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • Darktrace Active AI Security Platform

    BYTES SOFTWARE SERVICES LIMITED

    World-leading cyber-threat detection and real-time visibility in the Cloud. Compatible with all major Cloud providers (including AWS, Google Cloud and Microsoft Azure). The service uses self-learning technology to detect threats and anomalous behaviours. Fully configurable, it allows organisations to monitor all or selected Cloud traffic, with minimal performance impact. bssgc

  • Sophos Zero Trust Network Access (ZTNA)

    PHOENIX SOFTWARE LIMITED

    Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users.

  • Varonis SaaS Data Security Platform

    CM SECURITY LTD

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • SecurityRating.com: Third Party Risk & Vendor Risk Management + Attack Surface Management Platform

    Infosec Ventures

    SecurityRating.com: See your attack surface and third-party (vendor) risk with unrivalled clarity. Reduce your team’s workload with automation. Continuously monitor IT infrastructure. Get insights into vulnerabilities and threats, helping organisations manage risk and comply with regulations. Third-Party & Supply Chain Risk & Attack Surface Management made easy. Finally.

  • OSINT, WEBINT, SOCMINT & III = BLD COUNTER OPS PaaS

    BLUELIGHTSDIGITAL LTD

    COUNTER is an ecosystem of OSINT, WEBINT, SOCMINT and SIGINT Ops capabilities. Our solutions are designed to capture, acquire, identify, analyse and assess intelligence & investigations data for operators, analysts and investigators. Offering many levels of capability with service and support available from UK security cleared employees and expert partnerships.

  • Gov360 OpenSky : Enterprise Data & AI - Data Governance & Security (DGSaaS) - Purview

    OpenSky Data Systems

    OpenSky's "Data Governance & Security as a Service" leverages Microsoft Purview to provide comprehensive data protection, governance, and compliance across your multicloud and hybrid data estate. Our experts help you discover, understand, and secure your data, mitigate risks, and simplify compliance through a unified, AI-powered platform.