Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1698 results found

1698 results found in Lot 2: Cloud software in the category Security risk management

  • Trend Micro One

    INTEGRITY360 LIMITED

    Remote access to Trend Micro’s infrastructure is strictly controlled and monitored. All authentication methods used adhere to industry best practices/standards such ascertificate-based and/or multi-factor authentication. Where appropriate, single sign-on (SSO) leveraging the corporate directory is used.

  • Microsoft Power Platform Implementation Services including Dynamics 365

    WR LOGIC LIMITED

    The Application Development Teams work in squads to develop next generation cloud-based applications. Specialising in integration with PaaS services, the team develop responsive and feature rich applications that utilise the best technologies the cloud has to offer. Including PowerApps, PowerPlatform supporting the common data platform Dynamics 365

  • LogRhythm SIEM

    SAPPHIRE TECHNOLOGIES LIMITED

    A security operations service (SOC) tuned and designed for public sector use, effectively building a common SOC for public sector. This allows public sector to individually buy into a common set of standards and processes aligned to public sector threat intelligence.

  • ServiceIAM - Managed Identity Service Platform (MISP)

    CYBERIAM HOLDINGS LIMITED

    CyberIAM's MISP is a Managed Identity Service Platform, offering a set of services tailored to the size and needs of your environment; providing implementation of privileged and identity and access management (IAM and PAM) solutions to protect your identities as well as the management of the software after implementation.

  • Appvia Wayfinder

    APPVIA LTD

    A developer self-service platform: Provide self-service capabilities to Developers, ensuring secure and consistent infrastructure and application deployments on Azure, AWS and GCP. Manage a fleet of Kubernetes Clusters, (GKE, AKS, EKS) and Helm packages with automated workload identities and package up Terraform modules for self-service with application deployment templates.

  • Access Legal Compliance Software

    ACCESS UK LTD

    Our cloud-based risk and compliance platform helps firms record, track and manage their regulatory and quality standard obligations. The system is used to help them comply with the SRA Standards and Regulations, Lexcel and CQS. We have designed modules to make it easier to complete common risk and compliance activities

  • Cloud Backup, Data Protection, Network & Email Security, DRaaS

    PMD DATA SOLUTIONS LIMITED

    Specialist reseller of cloud-based backup, email protection, data retention, archive, migration and DRaaS (Disaster Recovery as a Service). Partner technologies include Barracuda, AvePoint, Redstor, Unitrends & Spanning. Protection for MicroSoft Office 365, Google Workspace, Google Classroom, Dynamics 365, Salesforce and Azure workloads.

  • Claroty Secure Remote Access (SRA / RAS)

    BARRIER NETWORKS LIMITED

    Frictionless, Reliable, and Highly Secure Remote Access for Industrial Networks.

  • Managed Anti-Malware (AppGuard)

    Intercity Technology Limited

    Managed Anti Malware (AppGuard) provides proactive endpoint security against advanced threats. It utilises zero-trust application control to prevent malware and ransomware attacks. Centralised management provides real-time monitoring and automatic updates. Enhance your defence without impacting performance. Ideal for businesses prioritizing robust, cloud-managed cybersecurity solutions.

  • KnowBe4 Compliance Plus

    SOFTCAT PLC

    Compliance Plus is a comprehensive new-school compliance training library of more than 500 modules that provides global continuously-updated, engaging, relevant, concise and customisable content to teach employees how to be compliant with their local organisational regulations

  • Tessian DLP

    SOFTCAT PLC

    Adaptive Email DLP uses behavioural AI to learn about your employees’ normal email sending behaviours, their trusted relationships and how they communicate sensitive data. It then analyses each email to detect anomalous behaviour, notifying admins of potential data loss incidents. warn users in real-time, prevent sensitive data loss through email.

  • Cloudlake Backup - Veeam Software as a Service

    AUTODATA PRODUCTS LIMITED

    Veeam software ensures that you can backup all workloads regardless of whether they are on premise, in the cloud or within a SaaS provider. Autodata’s Cloudlake Backup service ensures that you can protect every workload, regardless of location, whilst reducing costs and having support from an award-winning Veeam partner.

  • COOLSPIRiT a Databarracks Company: Illumio - Network Micro Segmentation

    COOLSPIRIT LIMITED

    Safeguard your organisation, stop digital attacks in their tracks. Illumio provides the only proven segmentation product suite purpose-built for Zero Trust security. Illumio has pioneered an unprecedented way to orchestrate Zero Trust segmentation down to the application and workload level, identifying and easily blocking pathways of attack to digital operations.

  • Teramind - Compliance, Security and Productivity

    SCG CORPORATE LIMITED

    Data Loss Prevention (DLP) is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection techniques, and contextual analysis to identify and categorize sensitive data and IP.

  • Digital Managed Services (hosting, support and maintenance)

    PANLOGIC LIMITED

    Hosting (physical vs. virtualised vs. cloud; shared vs. dedicated) Infrastructure support Application support Maintenance Digital infrastructure audit Disaster Recovery (DR) & 'hot'/'warm'/'cold' High availability (managing demand) Managed Services audit (investigation), migration (taking on third-party services) and Business As Usual (BAU)

  • IBM OpenPages with Watson

    IBM UNITED KINGDOM LIMITED

    IBM OpenPages with Watson is an AI-driven, highly scalable governance, risk and compliance (GRC) solution that runs on any cloud. Centralize siloed risk management functions within a single environment designed to help you identify, manage, monitor and report on risk and regulatory compliance, especially in today’s changing business landscape.

  • Computacenter - ProofPoint Archive

    COMPUTACENTER (UK) LIMITED

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.

  • TrustedFilter®

    4SECURE LIMITED

    TrustedFilter transforms, inspects, and filters a wide spectrum of data types and protocols such that only 'known good' data is allowed to cross network boundaries and between networks of different trust. We also provide file content disarm and reconstruction to sanitise files during transfer.

  • ICT and Telecoms Installation

    NETWORK 2 SUPPLIES LIMITED

    N2S are specialists in large scale multi-site ICT installations, including desktops, screens, unified comms/telephony and managed print. Utilise a fleet of tracked vehicles to return equipment to headquarters for WEEE recycling or resale.

  • Oracle Cloud BAU Support

    SERA NEON LIMITED

    Support Local Government end-users and the Business/Operations team with Oracle Cloud incidents—local Government expertise, supporting Business and System experts. Recent success includes onboarding a London Borough for Managed services and successfully transitioning from the outgoing Solution Integrator. ITIL/SWOT analysis for LocalGov Programmes. Automation utilities, ITSM tool.

  • Darktrace Antigena

    ITogether

    Darktrace Antigena is the world’s first proven Autonomous Response technology for the enterprise. The system operates as an AI decision-making framework that neutralises fast-moving and unpredictable attacks in seconds, while sustaining normal operations by design.

  • CDW Proofpoint Threat Protection Suite

    CDW LIMITED

    Proofpoint Threat Protection Suite is made up of Email Protection and Targeted Attack Protection (TAP). Email Protection (SEG Secure Email Gateway) includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP includes sandboxing attachments and URLs as well as URL rewritting and BEC Business Email Compromise detection.

  • Censornet Web Security (SWG)

    CM SECURITY LTD

    Censornet Web Security safeguards organisations from online threats by filtering web traffic. It offers URL filtering, malware detection, content inspection, and real-time threat intelligence for secure internet usage. Granular control over web access policies ensures compliance and risk mitigation.

  • Tenable Lumin

    INTEGRITY360 LIMITED

    Calculate, communicate and compare your cyber risk.

  • Secure Email Relay - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.

  • OPSWAT - MetaDefender Core

    ITogether

    OPSWAT's MD-Core consists of Multiscannng, Deep CDR, Filescan (Sandbox), DLP, File Based Vulnerability, Software Supply Chain for the protection against malware threats. OPSWAT has complimentary products and features such as Managed File Transfer (aka Vault), Diode Technology (CDS, IDG), and an umber of Access and IOT Solutions.

  • CheckPoint CloudGuard Cloud Security Posture Management

    BYTES SOFTWARE SERVICES LIMITED

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks. bssgc

  • Tenable Vulnerability Management (formerly Tenable.io)

    SOFTCAT PLC

    Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.

  • Vulnerability Management Solution

    GET SWARMS LIMITED

    GetSwarms provides an intuitive, cloud-based Vulnerability Management system that is easy to set up and deploy. It conducts comprehensive scans of your network, assets, and the deep web to identify potential security risks. The system also ensures compliance with industry standards, helping organizations protect their infrastructure and data effectively.

  • Protective DNS Local Reporting

    PEGASUS LABS PTY LTD

    When using a Protective or Filtering DNS service, these only identify which DNS queries were blocked not the source device on your local network. This service allows you to automatically track down and report on compromised devices inside your network, including IP address and device name.