Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • CDW Proofpoint Core Plus Package

    CDW LIMITED

    Proofpoint's Core Plus package adds Email Fraud Defence, Secure Email Relay, and Supplier Threat Protection to the Core package offerings. Proofpoint CORE Plus - Requires CORE P0 or CORE P1

  • Neotas Investigative SaaS Platform copy

    NEOTAS LIMITED

    Neotas offers online investigative enhanced due diligence solutions through its AI-driven SaaS platform that harnesses the power of OSINT to identify, understand, and connect both structured, unstructured data across the surface, deep, and the dark web to help private and public sector analyse digital footprint of any given entity.

  • Tenable One - Enterprise

    PHOENIX SOFTWARE LIMITED

    Visibility across your attack surface, focus efforts to prevent attacks/accurately communicate cyber risk to support optimal business performance. Attack Path Analysis for breach & attack mitigation and External Attack Surface Management for insight into the external attack surface, allowing organizations to identify and reduce risks from the attacker’s perspective.

  • Crowdstrike Falcon Next Gen SIEM

    4 DATA SOLUTIONS LIMITED

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Netwrix Threat Manager

    INTEGRITY360 LIMITED

    Threat detection software from Netwrix to detect and respond to abnormal behavior and advanced attacks with high accuracy and speed

  • Web Application Firewall WAF

    SAPPHIRE TECHNOLOGIES LIMITED

    Web Application and API protection. Deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security. Whether your application is hosted in a data center or in a public/private cloud, decision engine covers, OWASP top ten attacks, API attacks and Bots

  • SecurEnvoy MFA / Identity Access from Chess Cyber Security

    ARMADILLO SEC LTD

    SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.

  • Sophos Mobile

    Chess CyberSecurity Ltd t/a CyberLab

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • Computacenter - CheckPoint Cloud Native Application Protection Platform (CNAPP)

    COMPUTACENTER (UK) LIMITED

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.

  • IBM Storage Protect for Cloud for Dynamics 365

    IBM UNITED KINGDOM LIMITED

    IBM Storage Protect for Cloud Dynamics 365 provides cloud-based data protection for your organization’s Dynamics 365 data. You have granular control over what data to backup, and can store backups in Azure storage or your own storage system.

  • EverFox Zero Trust Content Disarm and Reconstruction (ZTCDR)

    SOFTCAT PLC

    ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.

  • View360Global. Immersive & Experiential Learning Platform (Multilingual)

    COGNITAS GLOBAL LIMITED

    View360global is a multilingual training platform using mixed reality to create immersive learning environments for in person or online delivery of facilitated training and exercising across all sectors. Scenarios can be customised to deliver unique training based on organisational and operational needs. Its also widely used for crisis management exercising

  • Meterian Application Security Platform

    METERIAN LTD

    Meterian security suite for enterprise applications continuously protects against vulnerabilities in open source components, stability and licensing risks, while validating the underlying digital infrastructure. Thanks to its unique ingestion algorithms, Meterian ensures unparalleled coverage and precision.

  • Mobile Application Development

    JBi Digital

    JBi Digital has years of experience designing and developing both online and offline mobile applications. JBI’s user-focused (UX) applications are built securely using industry best practices. The result is an intuitive, engaging and seamless mobile app that supports your goals and caters to your users’ specific needs.

  • BlueVoyant - Digital Risk Protection (DRP)

    SOMERFORD ASSOCIATES LIMITED

    Digital Risk Protection, detects and eliminates cyber threats before impact. Continuously monitoring, threat data sources, proprietary global DNS data sets, private cybercriminal instant messaging channels. Identify and validates threats, providing actionable countermeasures. Always accessible to add context and facilitate takedown phishing sites, domain lookalikes, social media impersonations, fraudulent apps.

  • F5 Distributed Cloud

    CYBIT LIMITED

    F5 Distributed Cloud Services are SaaS-based security, networking, and application management services that enable customers to deploy, secure, and operate their applications in a cloud-native environment wherever needed–data center, multi-cloud, or the network or enterprise edge.

  • Check Point Harmony Endpoint

    INTEGRITY360 LIMITED

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • CheckPoint CloudGuard Network Security (CGNS)

    BYTES SOFTWARE SERVICES LIMITED

    CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more. bssgc

  • Check Point Infinity Playblocks

    ITogether

    Check Point Playblocks is a modern cyber security training and simulation platform designed to enhance the security skills of IT teams. This innovative tool leverages gamification to create engaging and realistic cyber threat scenarios, helping teams to practice and improve their response strategies in a controlled environment.

  • CrowdStrike Falcon Data Protection

    SOFTCAT PLC

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • Galaxkey Enterprise Cloud Plus - Hybrid

    INTEGRITY360 LIMITED

    Galaxkey Enterprise Cloud Plus - Hybrid provides pure end-to-end Email encryption, file encryption, Secure Workspace collaboration and Digital Document Signing. All based on CPA certified encryption through the NCSC. Features: email revocation, classification, notifications, geofencing, digital signatures, secure collaboration and file sharing capabilities. Centrally managed with complete white labelling capabilities

  • Advanced Repair Management Solutions - Propsys360 Powered by Neo

    NEO TECHNOLOGY LIMITED

    Propsys360 streamlines every stage of the repairs lifecycle, from logging faults and triaging priorities to scheduling operatives, tracking progress and analysing data, ensuring faster first-time fixes, reduced downtime and happier residents. Automated workflows, mobile apps and intuitive dashboards unite teams, optimise parts usage, drive compliance and protect long-term asset value.

  • 247ib.com Library Management System for Prisons

    APPLIED NETWORK SOLUTIONS LIMITED

    247lib.com is a secure library asset and online resource management system. 247lib.com is a library management system, which allows prisons to manage their collections easily and efficiently. All applications are backed by full training, migration, implementation and support services.

  • Cloud SIEM as a Service

    VIEWDECK ENGINEERING LIMITED

    Secure Open Source Security platform, providing agent/syslog based Endpoint Security, Threat Intelligence, Security Operations and Cloud Security as a Service. Deploy to Secure Public, Sovereign and Private cloud environments. Unified XDR and SIEM protection for endpoints and cloud workloads. Consolidate your logs, events and compliance into one place.

  • Attack Surface Monitoring

    Red Sift

    Continuous automated discovery of Internet and Cloud assets, with comprehensive monitoring and coverage of network and security standards. Special focus on subdomain takeover protection. Covered standards include WHOIS/RDAP, DNS, DNSSEC, SMTP, SPF, DMARC, MTA-STS, SSL, TLS, PKI, HTTP, web application security, CSP, HSTS, CAA, security headers, technologies.

  • AvePoint Policies for Microsoft 365

    SOFTCAT PLC

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.

  • Proofpoint Enterprise Data Loss Prevention

    BYTES SOFTWARE SERVICES LIMITED

    Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action. bssgc

  • GoAnywhere MFTaaS (Fortra) - from HANDD (MFT)

    HANDD BUSINESS SOLUTIONS LIMITED

    GoAnywhere MFTaaS (Managed File Transfer as a Service) is a cloud-based solution for secure file transfers. It offers encryption, automation, and centralised management, enabling businesses to securely exchange data across systems, partners, and platforms. It simplifies file transfer processes while ensuring compliance with data security regulations.

  • Claroty xDome

    INTEGRITY360 LIMITED

    Claroty xDome spans the entire cybersecurity journey, empowering organisations with comprehensive OT (operational techncology)/ICS (Industrial Control Systems) asset visibility, identifying, measuring, prioritising risk, deploying Zero Trust-based protective controls, to optimising threat-detection through a vast network of integrations. xDome is a modular, SaaS platform that makes XIoT cybersecurity decision clear through:

  • Experian Tracing Solutions for Police and Law Enforcement with Investigator Online

    EXPERIAN LIMITED

    Investigator Online is a secure web service product to enable the Police and Law Enforcement agencies to investigate crime