Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Check Point Harmony SASE

    INTEGRITY360 LIMITED

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • Keeper - Password Manager

    NETWORK UTILITIES (SYSTEMS) LIMITED

    Keeper is a password manager that securely stores, manages, and generates passwords. It uses encryption to protect passwords and other sensitive data, like credit card information and personal notes. Keeper offers features such as password generation, auto-fill, two-factor authentication, and secure sharing, across multiple platforms.

  • Computacenter - Proofpoint Core - P1 Bundle

    COMPUTACENTER (UK) LIMITED

    Proofpoint P1 Bundle includes Email Protection (Secure Email Gateway antivirus and spam detection), Targeted Attack Protection (sandboxing and reporting), Threat Response Auto Pull (Mail Security Orchestration Automation Response) and Proofpoint Security Awareness Training (including phishing simulation).

  • Forescout Cloud: - Risk & Exposure Management (REM) - Threat Detection and Response (TDR)

    SOFTCAT PLC

    The solution provides visibility and the cyber risk for any IP/MAC address connected cyber assets. Visualise the risk and compliance posture changes over time. Detect any cyber threats and orchestrate the response.

  • Sentinel PiNG

    YUDU Sentinel

    An independent communication and collaboration tool designed to replace social media chat applications. It is a corporate chat application that maintains records of all chats on central cloud servers for compliance with point to point encryption and encryption of stored chats. Used by senior management and crisis management teams.

  • Luciditi Passwordless Login Services (FIDO2)

    ARISSIAN LTD

    Quickly add FIDO2 Passwordless Biometric Authentication to your Applications using the Luciditi low-code SDK. In place of a password, a users’ unique biometrics such as fingerprints are used to generate a unique private key which is stored on a users device and is unique and used to access the application.

  • Kentico web content management

    SPINDOGS LTD

    Kentico web content management. Mobile optimised, accessible development. Spindogs' Kentico CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.

  • Computacenter - CrowdStrike Falcon for IT

    COMPUTACENTER (UK) LIMITED

    CrowdStrike Falcon® for IT, a module of the leading AI-native CrowdStrike Falcon® platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action.

  • Tanium Converged End Point Management (XEM)

    KHIPU NETWORKS LIMITED

    Visibility, control, compliance and remediation of endpoints in real-time, cloud-scale and autonomous - Tanium offers the only converged endpoint management (XEM) platform that combines end-to-end visibility, control, and remediation in one place.

  • CrowdStrike Falcon Counter Adversary Operations

    INTEGRITY360 LIMITED

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.

  • Proofpoint Threat Protection Suite

    SOFTCAT PLC

    Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.

  • Keepnet Human Risk Management / Cyber Awareness Training

    ITogether

    Keepnet Labs focuses on cyber security, particularly human factors, using advanced technology and behavioural insights to enhance digital security across organisations. It provides comprehensive solutions for managing human-related security risks with tools like phishing simulators and incident response platforms, aiming to foster a proactive and resilient security culture.

  • Active Directory Compromised Password Monitoring

    PEGASUS LABS PTY LTD

    Pegasus Labs AD Protection stops users adding common or compromised passwords to their accounts, resets existing breached passwords and detects AD misconfigurations. It continually monitors and automatically responds to new breaches keeping Active Directory and Azure AD secure.

  • Mimecast Brand Exploit Protect

    CHESS ICT LIMITED

    Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.

  • CDW Check Point Harmony Endpoint

    CDW LIMITED

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Netsweeper Offsite Web Filter

    Netsweeper Inc.

    Part of the Netsweeper Education Ecosystem, works with the Netsweeper central platform to extend web filtering and digital monitoring to student devices, ensuring they remain protected when they leave the school’s network. It can be installed on Windows, OSX, Chrome, iOS and Android devices.

  • Technology Selection

    JBi Digital

    JBi Digital will guide you to build the optimal tech stack for your organisation with robust, scalable and secure solutions that are customised by certified professionals. Whether you’re updating entire systems or making targeted improvements, our approach is driven by your requirements and informed by in-depth user and system analysis.

  • CheckPoint CloudGuard Web Application Firewall (WAF)

    SOFTCAT PLC

    Web Application and API protection. With deep application contextual analysis, eliminates the trade-off between level of security and complexity of managing application security. Whether application is hosted in data centre or in a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks, blocks automated attacks (Bots)

  • Splunk Threat Detection Investigation and Response Suite

    SOFTCAT PLC

    Use any or all of Splunk’s Security products and services together to provide a unified security operations solution. On top of Splunk Enterprise or Splunk Cloud, combine Enterprise Security (SIEM), Mission Control, Splunk Attack Analyser (SAA), Splunk Threat Intelligence Management (TIM), Splunk SOAR, and Splunk UBA.

  • Mimecast Cyber Resilence Pro Plan

    VE3 GLOBAL LTD

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • CrowdStrike Falcon Next Gen SIEM

    SOFTCAT PLC

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Galaxkey Secure Email

    INTEGRITY360 LIMITED

    Galaxkey Secure Email provides pure end-to-end Email Encryption. Features include: email revocation, classification, notifications and geofencing. All centrally managed with complete white labelling capabilities. Encryption is CPA Certified by the NCSC.

  • CDW Sophos Central Email Advanced (CEMA)

    CDW LIMITED

    Sophos Email is a cloud-based secure email gateway solution built to integrate seamlessly with popular email platforms (Exchange Online, Google Suite etc..). Sophos Email is engineered to keep businesses safe from email threats such as Malware, Zero Day, Phishing, Spam while also preventing Data Loss and providing Email Encryption

  • Vectra Detect for M365 + AWS

    INTEGRITY360 LIMITED

    As the industry’s first network detection and response solution for the cloud, Vectra Detect for Office 365 and Azure AD extends the proven platform that currently protects public clouds, private data centres, and enterprise environments to Microsoft Office 365.

  • Broadcom/Symantec Protection Engine

    GRADIAN SYSTEMS LTD

    Symantec Protection Engine (SPE) for Cloud Services 8.2 is a flexible and feature-rich client/server application that allows customers to incorporate malware and threat detection technologies into almost any application. SPE for Cloud Services provides access to innovative security that helps to ensure the safety of incoming content to your environment.

  • SentinelOne Singularity Platform

    BARRIER NETWORKS LIMITED

    Autonomous cybersecurity platform that consolidates security functions across surfaces–endpoint, cloud, and identity–and makes intelligent use of the data natively ingested and through our partner integrations. SentinelOne strives to extend our native detection and response capabilities with XDR integrations to improve workflows and provide more human context to enterprise security teams.

  • Forcepoint Insider Threat (FIT)

    CHESS ICT LIMITED

    Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 15 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.

  • Check Point Cloudguard WAFaaS

    ITogether

    Check Point CloudGuard WAF provides Web Application and API protection.With deep application contextual analysis,it eliminates the tradeoff between the level of security and the complexity of managing application security.Whether your application is hosted in a datacenter or in a public/private cloud,CloudGuard's patent-pending decision engine covers,OWASP top ten attacks,API attacks

  • Zscaler Security from Virgin Media O2 Business

    VIRGIN MEDIA BUSINESS LIMITED

    Zscaler is a global cloud-based information security company that provides Secure Access Service Edge (SASE) solutions; internet security; web security; next generation firewalls; sandboxing; SSL inspection; antivirus; vulnerability management and granular control of user activity in cloud computing, mobile and Internet of Things (IoT) environments.

  • Akamai Bot Management and protection

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.