Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2514 results found

2514 results found in Lot 2: Cloud software in the category Security

  • Computacenter - Splunk Threat Detection Investigation and Response Suite

    Computacenter (UK) Ltd

    Use any or all of Splunk’s Security products and services together to provide a unified security operations solution. On top of Splunk Enterprise or Splunk Cloud, combine Enterprise Security (SIEM), Mission Control, Splunk Attack Analyser (SAA), Splunk Threat Intelligence Management (TIM), Splunk SOAR, and Splunk UBA.

  • Secris - automated vulnerability scanner

    Made Purple Ltd

    Secris is a comprehensive Cyber Security tool that automatically finds risks and vulnerabilities in your systems and infrastructure. Our Automated Vulnerability scanner monitors and secures your external endpoints, catalogue system inventory and software and automatically check them against current CVE's and emerging threats from a range of sources.

  • Exchange Online Plan 1

    PHOENIX SOFTWARE LIMITED

    Exchange Online Plan 1 provides business class email, contact management, calendaring services. 50Gb per user. Access using the rich Outlook client, tablet / phone applications or internet browsers. Includes anti-malware and spam filtering. Interact with Shared Mailboxes, Group Mailboxes, Public Folders, OneDrive, Office, 3rd party applications and more.

  • ManageEngine Endpoint Central: Cloud-based Unified Endpoint Management and Security Solution

    Zoho Corporation Limited

    Endpoint Central is an endpoint management and security solution for a company's IT infrastructure. It manages servers, desktops, laptops, and devices across multiple OSs from a single console. Crafted for SMBs and enterprises alike, it simplifies and automates routine tasks while securing against cyberattacks with its integrated endpoint protection suite.

  • Forescout - EyeSight / EyeControl / EyeInspect

    Barrier Networks

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assests.

  • Proact Security Incident and Event Management (Microsoft Sentinel)

    Proact IT UK Limited

    Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).

  • Amazon WorkSpaces

    SOFTCAT PLC

    Amazon WorkSpaces offers you an easy way to provide a secure, managed, cloud-based virtual desktop experience to your end-users. Amazon WorkSpaces provides a fully managed service. With Amazon WorkSpaces, you can deliver a high-quality portable desktop, and applications, to your users on the device of their choice.

  • Check Point Harmony SaaS

    LRQA

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.

  • EIS (Cantium) Redstor

    Cantium Business Solutions

    Redstor, with EIS (the trading arm of Cantium), is a globally trusted provider of cloud-native data management technology. The solutions enable organisations to swiftly recover and access data, securely archive older data, analyse data trends, and ensure compliance with regulations such as GDPR through e-discovery for data subject access requests.

  • DevOps Continuous Compliance Server

    Viewdeck Consulting Limited

    DevOps Continuous Compliance Server offers the UK public sector a comprehensive SaaS solution for regulatory adherence in software development. With automated compliance checks, real-time monitoring, and tailored compliance policies, organisations can streamline compliance management, ensure regulatory adherence, and enhance accountability while maintaining security and scalability in a cloud-based environment.

  • SQL Server 2012 Extended Security Updates

    NAK Consulting Services Ltd

    Extended Security Updates for SQL Server 2012

  • Access TEC Oysta

    ACCESS UK LTD

    Access Mobile TEC solutions include personal alarms with location-based technology built in therefore offering individuals support both inside and outside the home. Different form factors are available including a pendant alarm, mobile app and a wrist-worn watch. Settings are configurable to each individual depending on their telecare needs.

  • Mimecast Perimeter Defence Plan (Zone 1)

    Planet IT

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Stone Cloud Enterprise Network Security - Cisco Duo Multi Factor Authentication

    Stone Technologies Limited trading as Converge Technology Solutions

    Stone utilises Cisco Duo to provide Multi Factor Authentication. Duo’s Trusted Access platform is a holistic security solution that reduces your risk of a data breach caused by compromised credentials, known vulnerabilities and/or exploits.

  • ProxyAddress

    ProxyAddress

    ProxyAddress is a unique, award-winning service providing secure 'proxy' address details to those facing the instability of homelessness. A ProxyAddress helps to establish consistency and can be used like a normal address to securely access vital services and support, regardless of location or how often an individual moves.

  • Barrier Networks Zero-Trust Access Control & IoT Security (Fortinet FortiNAC)

    Barrier Networks

    Network Access Control (NAC) is a critical component in the modern-day network. NAC offers organisations the ability to deploy Zero Trust Network Solutions, Secure SD Branch Deployments and ensure IoT, BYOD and user devices are profiled, only allowed to access approved resources and periodically reviewed for compliance.

  • Heimdal Security - Unified Threat Platform

    Network Utilities (Systems) Ltd

    One Platform, One Agent, Complete Protection From ransomware and insider threat, to business compromise and anything in between, Heimdal™ protects your operational integrity by stopping even the most sophisticated cyberattacks from day one. Bundle includes: Threat Prevention, Patch & Asset Management Next-Gen Antivirus & MDM

  • Mimecast Cybergraph

    Planet IT

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • altSRD - Secure Remote Desktop

    ALTIATECH LTD

    altSRD provides right-sized virtualized desktop solutions that balances security, productivity and value - Parallels RAS (remote application server): a flexible virtual application and desktop delivery solution. Parallels Secure Workspace (formerly Awingu): a highly secure and auditable access to your desktops, company files as well as legacy, web, and SaaS apps.

  • HPE Aruba Meridian & CriticalArc Location Tracking and Wayfinding

    Khipu Networks Limited

    KHIPU's Safety offering, using CriticalArc's and HPE Aruba's Meridian platforms, provides response teams with complete visibility of everyone and every incident to enhance the protection of people, facilities, and assets. It enables people to respond to any issue/threat/risk by identifying their location and guiding (wayfinding) them to areas of safety.

  • CMS - content management system

    S8080 LIMITED

    ISO27001 certified open source, cloud-hosted CMS for digital services and websites. S8080’s GDPR compliant open source CMS platforms securely handle multilingualism, CRM, integrations, single sign-on, forms and workflow. Open-source Drupal and Umbraco content management systems are easy to use, yet powerful. Mobile and accessible CMS, designed around your user’s needs.

  • Miya Patient Flow

    Alcidion UK Ltd

    Industry-leading digital patient flow journey boards providing healthcare teams with at-a-glance information on patients, and actions needed to ensure timely care and discharge. We deploy integrated, interactive journey boards to support efficient bed management and command and control – from ward level, to clinical specialties, hospitals and ICS wide insights.

  • Sophos Integration Packs

    PHOENIX SOFTWARE LIMITED

    Sophos offers seamless integration with a broad, open ecosystem of technology partners to deliver superior cybersecurity outcomes.

  • Neo Technology Power BI Optimisation Service

    NEO TECHNOLOGY LIMITED

    Neo Technology's Power BI Optimisation Service ensures your organisation maximises the potential of its Power BI implementation. Our team of analytics experts offers comprehensive design, implementation, and managed services for both new and existing solutions. We utilise agile delivery methods to provide tailored self-service BI architectures, robust governance models.

  • Kanzi: Secure Instant Messaging

    SUREVINE LIMITED

    Kanzi is an instant messaging service which is designed and built with security at the forefront, without compromising on ease of use or support. Kanzi delivers instant messaging at scale for mission-critical communication, enforcing your information sharing rules whilst enabling effective collaboration within and beyond your organisation.

  • Mimecast

    Redinet Ltd

    Mimecast offer security services that provide proactive threat detection, brand protection, awareness training, and data retention capabilities that evolving workplaces need today.

  • KnowBe4 Compliance Plus

    INTEGRITY360 LIMITED

    KnowBe4 Compliance Plus is a comprehensive new-school compliance training library of more than 500 modules that provides global continuously-updated, engaging, relevant, concise and customisable content to teach employees how to be compliant with their local organisational regulations.

  • Check Point CloudGuard Cloud Native Application Protection Platform (CNAPP)

    LRQA

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.

  • Nutanix Application Mobility Services

    HYPER TALENT SOLUTIONS LTD

    Nutanix Application Mobility Services enable seamless application migration across different IT environments. This service ensures that applications remain agile and accessible, regardless of the underlying infrastructure. It simplifies the process of moving workloads, maintaining data integrity, and optimizing performance, thereby enhancing business flexibility and adaptability.

  • Chrome - Google Forms

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions provides Chrome - Google Forms, a versatile tool for creating surveys, quizzes, and forms. It enables educators to easily gather data, assess student learning, and manage event registrations, all within a user-friendly interface that integrates smoothly with other Google services for comprehensive data analysis and classroom management.