Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1698 results found

1698 results found in Lot 2: Cloud software in the category Security risk management

  • MTI SOC and SIEM Managed Service

    MTI TECHNOLOGY LIMITED

    MTI’s Managed SIEM / SOC platform applies industry-leading technologies. Asset Discovery/Management, Vulnerability and Patch Scanning, SIEM Logging/Correlation/Alerting, Intrusion Detection, Automated Incident Response/Defence, User Behaviour Analytics, Threat Intelligence, Full Cloud Integration, Custom Dashboards/Playbooks, Service Desk alerting/ticketing, XDR, MDR, MXDR, 24x7, Defender, Sentinel, SC-Cleared UK-based NCSC cyber experts. Threat Simulation Exercises.

  • Risk Based Vulnerability Management

    GAMMA NETWORK SOLUTIONS LIMITED

    Identify and prioritise vulnerabilities based on risk to your business. Managed in the cloud.

  • Tenable One - Standard

    BYTES SOFTWARE SERVICES LIMITED

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance. Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory bssgc

  • ManageEngine Patch Manager Plus: Unified patch management and vulnerability remediation solution

    ZOHO CORPORATION LIMITED

    A unified patch management solution that streamlines and automates the patch management lifecycle of an enterprise, from testing to deployment of the patches and generating reports. It supports patching across servers, workstations, and laptops and deploys patches to Windows, macOS, Linux, drivers, BIOS, antivirus, and 850+ applications on various networks.

  • DRATA - GRC

    Grove Information Systems

    Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

  • PCI Pal® Agent-assisted phone-based payments

    PCI-PAL (U.K.) LIMITED

    PCI Pal® Agent-assisted phone-based payments, utilises DTMF (Dual Tone Multi Frequency) masking technology to provide companies with a secure way of handling payments by phone without bringing their environments in scope of PCI DSS. Allowing merchants complete flexibility to enable their customers to click to pay or speak to pay.

  • Trustmarque Check Point Infinity Product Set

    TRUSTMARQUE SOLUTIONS LIMITED

    A range of cloud-based security service products that deliver secure access to cloud applications and resources, simplifying security management and protecting user against advanced threats.

  • Censornet Cloud Application Security Broker (CASB)

    CM SECURITY LTD

    CASB provides administrators with comprehensive visibility and control over the usage of SaaS platforms within their organisation. It helps manage shadow IT usage, allowing organisations to identify and address security risks associated with unauthorised cloud applications and prevent unauthorised sharing of sensitive data.

  • ServiceNow Adoption (Implementation)

    Scarce IT

    Through our fast-track adoption approach, we embed ServiceNow quickly and optimally, speed your ROI, and facilitate digital and cultural transformation for your business. Whether you are considering ServiceNow, or have purchased and need help implementing, Scarce will deliver you successfully, affordably & speedily onto the world’s leading Enterprise IT Platform.

  • Neo Technology Accessibility Assessment Service

    NEO TECHNOLOGY LIMITED

    Neo Technology's Accessibility Assessment Service ensures digital products and services comply with WCAG standards and accessibility regulations. Our certified UX practitioners conduct thorough audits, providing actionable insights and recommendations for improving accessibility and achieving compliance.

  • Cloudflare Zero Trust Network Access (ZTNA)

    SOFTCAT PLC

    Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.

  • CrowdStrike Falcon Complete MDR

    INTEGRITY360 LIMITED

    Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.

  • Data Compliance Solution

    UNISYS LIMITED

    Unisys Data Compliance provides a complete data compliance information management platform which crawls file-stores/email, gathers metadata, uncovers PII information, classifies documents/attachments using advanced AI, looks for special company/organisation data, finds duplication, and presents a risk score using a highly configurable rules and AI based calculation engine, for every file found.

  • Check Point CloudGuard Intelligence - Intrusion Detection, Threat Hunting & Remediation

    CHARTERHOUSE VOICE & DATA LIMITED

    CloudGuard Intelligence (previously called CloudGuard Log.ic) delivers advanced cloud intelligence and simplified visualisation for faster and more efficient incident response. It provides more effective incident detection and auto-remediation, augmented through AI and ML, across multi-cloud environments.

  • Waste & Streets In-Cab System, RouteSmart Route Optimisation, Trade & Jobs

    INTEGRATED SKILLS LIMITED

    Cloud-based waste & streets platform with easy-to-use, next-gen incab navigation & service verification, mobile apps, job and performance management (including automated alerts), integration APIs to CRM, finance, weighbridge, etc. Applied to all services including trade waste. Route optimisation software for strategic modelling, and creation of detailed, optimised, balanced driving routes.

  • Workspace ONE Access and Hub Services

    XTRAVIRT LIMITED

    Workspace ONE Access can provide multi-factor authentication, conditional access and single sign-on across SaaS, web, and native mobile apps. Brokering different identity stores and providers, Workspace ONE Access can deliver apps from on-premises and multi-cloud infrastructures. Workspace ONE Hub Services provides a centralized app catalog plus notifications, people-search, and more.

  • Heimdal Security - Patch and Asset Management

    NETWORK UTILITIES (SYSTEMS) LIMITED

    Automate your vulnerability management and save valuable time and resources with a patch management solution that lets you deploy and patch any Microsoft and Linux OS, 3rd party and proprietary software, on-the-fly according to any schedule. With complete visibility and granular control over your entire software inventory.

  • Web Application Security Platform ('WASP')

    JUMPING RIVERS LTD

    Our Web Application Security Platform allows you to easy monitor external resources that Shiny apps and markdown documents are using. When a user visits any application on your RStudio Connect server, this will silently trigger a comparison of your web-page with an a pre-defined allowed resource list.

  • MetaCompliance Security Awareness Essentials

    METACOMPLIANCE LIMITED

    MetaCompliance Security Awareness Essentials helps to raise awareness of cyber threats, reduce the risks associated with attacks, and embed a culture of security compliance. Organisations can automate their annual security awareness program and deliver 12 months of awareness activities that engage employees to uphold best practice behaviours, all year round.

  • Orca Security CNAPP

    INTEGRITY360 LIMITED

    Orca Security is the leading agentless CNAPP that allows security teams to work smarter, not harder. Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and focus on remediating the actual risks that matter most.

  • CDW Sophos Managed Risk

    CDW LIMITED

    Managed Risk is a vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. With Managed Risk, experienced analysts identify high-priority cybersecurity vulnerabilities and potential attack vectors in your environment so actions can be taken to prevent attacks

  • Forcepoint Behavioural Analytics (FBA)

    GRADIAN SYSTEMS LTD

    Forcepoint Behavioural Analytics (FBA) enables security teams to proactively monitor for high risk behaviour inside the enterprise. Uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud

  • Patch & Asset Management Solution

    GET SWARMS LIMITED

    Our Service involves the systematic management of software updates and tracking of digital assets within an organization's IT infrastructure. It encompasses processes such as automated patch deployment, asset inventory management, compliance monitoring, and system optimization. Our goal is to ensure the security, reliability, and regulatory compliance of IT systems.

  • Drata Automated Governance, Risk & Compliance Platform

    Security Software Solutions Ltd (S3 Ltd)

    Drata is a security/compliance automation platform that continuously monitors and collects evidence of your security controls, while streamlining workflows to ensure audit-readiness. It’s an all in one GRC platform, integrating with all your SaaS services to bring compliance status of all your people, devices, assets, and vendors into one place.

  • Bizzdesign Horizzon

    BIZZDESIGN UK LTD.

    Bizzdesign Horizzon is an Enterprise Architecture (EA) platform, recognised by major analyst firms. It helps organisations with investment prioritisation, transformation delivery and risk management; presenting multi-dimensional visualisations of the design and transition path to the targeted future. Success should not be a matter of hope. It should be by design.

  • Google Chronicle Security Operation Platform, SIEM & SOAR

    KHIPU NETWORKS LIMITED

    Chronicle offers a unified experience across SIEM, SOAR, and threat intelligence to drive better detection, investigation, and response. Collect security telemetry data, apply threat intel to identify high priority threats, drive response with playbook automation, case management, and collaboration.

  • Proofpoint Insider Threat Management

    SOFTCAT PLC

    Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly. And we correlate user activity and data movement to protect you from insider-led data breaches.

  • Sentinal One

    COMMUNICATION STEM LIMITED

    Sentinal One Singularity Complete provides best-in-breed EPP & EDR capabilities in one platform, management console, and agent. Designed for organizations seeking enterprise-grade prevention, detection, and response scalable across the enterprise, coupled with custom automations, Singularity Complete empowers security teams to easily identify and secure every user endpoint on their network

  • Sophos Managed Risk

    BYTES SOFTWARE SERVICES LIMITED

    Sophos Managed Risk is a vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. Our experienced analysts identify cybersecurity vulnerabilities and potential attacks in your environment so actions can be taken before they disrupt your business. bssgc

  • TRUSTMARQUE FORCEPOINT PRODUCT SUITE

    TRUSTMARQUE SOLUTIONS LIMITED

    Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organisations while driving digital transformation and growth. Their solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value