Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Managed Detection and Response (MDR) as a service

    PROACT IT UK LIMITED

    Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).

  • Microsoft 365 CSP

    Transparity

    Our CSP Subscriptions for Microsoft 365 provide the subscription licensing of your Microsoft Cloud environment in a flexible and cost-effective manner. We also offer proactively managed services which are offered as a chargeable add-on services, which are materially lower in cost than traditional asset and user based managed service offerings.

  • Microsoft 365 Email Security (via Mimecast)

    Atlas Cloud

    Microsoft 365 is widely used, but its standard email security may not be enough. Mimecast offers layered protection that complements Microsoft’s defences. It stops threats without hindering collaboration, keeps archives compliant, and empowers end-users. Think of it as adding an extra lock to your digital door.

  • Sophos Intercept X Server

    Chess CyberSecurity Ltd t/a CyberLab

    Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.

  • Managed Detection and Response (MDR)

    CYMBALSTREAM SOLUTIONS LIMITED

    Cymbalstream delivers 24/7 monitoring and response software designed to detect, investigate, and mitigate cyber threats across networks, endpoints, and cloud environments. Combining advanced security technology, threat intelligence, and expert-driven workflows, our platform enables organisations to proactively hunt for threats and respond to incidents across their IT infrastructure.

  • Tenable Vulnerability Management

    BYTES SOFTWARE SERVICES LIMITED

    Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud. bssgc

  • boxxe Vulnerability and Patch Management as a Service

    BOXXE LIMITED

    boxxe's Vulnerability and Patch Management services aims to take away the burden of identifying and remediating software vulnerabilities within your IT environment including on your server estate and your end user devices. boxxe uses market leading solutions along with our internal security analysts to identify, prioritise and remediate software.

  • Forcepoint Data Guard (FDG)

    GRADIAN SYSTEMS LTD

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • RSign: eSignatures Made Easy

    RPOST UK LIMITED

    RSign® is the award-winning eSign and eForms feature-rich and affordable solution by RPost®. Recognized by IDC MarketScape and Aragon Research, RSign ensures compliance, security, and convenience. It integrates seamlessly with platforms like Outlook and Salesforce. Streamline workflows, reduce eSignature costs, and improve customer service. Choose RSign - just switch it!

  • Sophos Intercept X Advanced

    Ostratto

    Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. For virtual environments, a light agent for Windows Desktop VM’s provides off-board scanning and protection.

  • boxxe Sophos Managed Detection and Response Essentials (MDR) Endpoint

    BOXXE LIMITED

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Amazon AppStream 2.0

    SOFTCAT PLC

    Amazon AppStream 2.0 lets you move your desktop applications to AWS, without rewriting them. It’s easy to install your applications on AppStream 2.0, set launch configurations, and make your applications available to users.

  • Powered by Neo: Optimised Document Management

    NEO TECHNOLOGY LIMITED

    Neo Technology's Document Management solution offers features like document retrieval, upload and tagging, notifications, search functionality, access permissions, secure storage, online edits, photo upload extension, and bulk letter splitting. It ensures compliance, improves information accessibility, enhances customer experience, and streamlines internal processes.

  • READ: AI Analyst for CTI

    Elemendar - AI for Cyber Threat Intelligence (CTI)

    Elemendar supplies READ, an AI analyst for Cyber Threat Intelligence (CTI), the information that tells cyber defence analysts which threats to defend against. READ makes this intelligence written for humans machine-readable so that organisations can instantly defend against new cyber threats.

  • Board Portal

    ADMINCONTROL AS

    Admincontrol is a leading Board Portal and Virtual Data Room provider. Working to the highest level of security and with a tablet based intuitive user interface, our services are utilised by private and public sector organisations to enhance the the flow of sensitive information across Boards and Management worldwide.

  • Akamai Global Traffic Manager / Load Balancing

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • CDW Crowdstrike Falcon Data Protection

    CDW LIMITED

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • M365 and Azure Security Services

    BRIDGEALL LIMITED

    We provide a comprehensive 24/7 security service for Microsoft 365 and Azure. Our service includes advanced threat detection across your email, documents, and collaboration tools, with real-time protection against phishing, malware, and ransomware. Our team manages your security posture, ensuring best practices are followed and vulnerabilities are quickly addressed.

  • boxxe Sophos Intercept X Server

    BOXXE LIMITED

    Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.

  • boxxe Workspace ONE UEM (Academic)

    BOXXE LIMITED

    VMware Workspace ONE UEM is the secure enterprise platform that delivers and manages any app on any device. By integrating app management, unified endpoint management, and real-time application delivery, Workspace ONE UEM engages digital employees, reduces the threat of data loss, and modernizes traditional IT operations for the mobile-cloud era.

  • CyberArk Endpoint Privilege Manager (EPM) SaaS

    PHOENIX SOFTWARE LIMITED

    CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.

  • GovAI Transform: AI-Powered Automation for UK Government Services

    WR LOGIC LIMITED

    GovAI Transform is a tailored service empowering UK government entities by integrating artificial intelligence into their workflows. Leveraging Microsoft Azure's AI tools like Cognitive Services, Logic Apps, and Functions, it automates complex tasks, boosting service delivery, regulatory compliance, data security, and operational efficiency.

  • Continuous Penetration Testing

    SAPPHIRE TECHNOLOGIES LIMITED

    Penetration testing is often performed annually or after a major change, yet minor changes and vulnerabilities are discovered all the time while criminals constantly scan you. This service offers constant exterior scanning of your estate to look for weaknesses and goes beyond vulnerability scan.

  • AvePoint Cloud Governance for Microsoft 365

    BYTES SOFTWARE SERVICES LIMITED

    M365 is an essential productivity solution millions of people use every day. With that use comes significant challenges in how you can scale your management and security of the platform. Implement an extensible governance framework that empowers users, is easy to maintain, and scales with your organization. bssgc

  • Claroty Medigate

    BARRIER NETWORKS LIMITED

    The Medigate Platform is the industry’s leading healthcare cyber-physical systems protection platform that enables healthcare organisations to safely deliver connected care while enhancing efficiencies across the clinical environment. The Medigate Platform spans the entire healthcare cybersecurity journey regardless of the scale or maturity of your environment.

  • Data Services

    MASS CONSULTANTS LIMITED

    MASS provides expert support and training in tools like SharePoint, Purview, and PowerApps. We automate workflows, develop bespoke PowerApps, build data visualisations, and create RRD processes. Training is delivered remotely or onsite. Operating at Official, Official-Sensitive and SECRET, we work via outcome-based SoWs or flexible rate card models.

  • iboss Zero Trust Secure Access Service Edge

    PHOENIX SOFTWARE LIMITED

    iboss is a Zero Trust Edge.  iboss utilises a containerised cloud architecture allowing customers to easily migrate from legacy appliances, maintaining 100% dedicated IP address space in the cloud. Allowing for PDNS intergration, admin created GDPR Zones with dedicated UK datacentres. Packages include Core Filtering, Malware detection, Data Loss Prevention

  • CrowdStrike Application Security Posture Management

    INTEGRITY360 LIMITED

    CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • Emergency Services Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empower emergency services users with complete control of case management end-to-end requirements. Secure, scalable, with GDPR and DPA Pt3 compliance, hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Microsoft Sentinel SIEM Licences

    MONDAS CONSULTING LTD

    Purchase Microsoft Sentinel SIEM licences to utilise the power of Sentinel to collate log data from all of your Microsoft security tools and generate alarms for a SOC team to triage. Microsoft Sentinel can remediate these alarms using powerful automated playbook actions.