Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1557 results found

1557 results found in Lot 2: Cloud software in the category Secure content and threat management

  • boxxe Sophos Intercept X Server

    BOXXE LIMITED

    Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.

  • boxxe Workspace ONE UEM (Academic)

    BOXXE LIMITED

    VMware Workspace ONE UEM is the secure enterprise platform that delivers and manages any app on any device. By integrating app management, unified endpoint management, and real-time application delivery, Workspace ONE UEM engages digital employees, reduces the threat of data loss, and modernizes traditional IT operations for the mobile-cloud era.

  • CyberArk Endpoint Privilege Manager (EPM) SaaS

    Phoenix Software Ltd

    CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.

  • GovAI Transform: AI-Powered Automation for UK Government Services

    WR LOGIC LIMITED

    GovAI Transform is a tailored service empowering UK government entities by integrating artificial intelligence into their workflows. Leveraging Microsoft Azure's AI tools like Cognitive Services, Logic Apps, and Functions, it automates complex tasks, boosting service delivery, regulatory compliance, data security, and operational efficiency.

  • Continuous Penetration Testing

    Sapphire

    Penetration testing is often performed annually or after a major change, yet minor changes and vulnerabilities are discovered all the time while criminals constantly scan you. This service offers constant exterior scanning of your estate to look for weaknesses and goes beyond vulnerability scan.

  • AvePoint Cloud Governance for Microsoft 365

    Bytes Software Services

    M365 is an essential productivity solution millions of people use every day. With that use comes significant challenges in how you can scale your management and security of the platform. Implement an extensible governance framework that empowers users, is easy to maintain, and scales with your organization. bssgc

  • Claroty Medigate

    Barrier Networks

    The Medigate Platform is the industry’s leading healthcare cyber-physical systems protection platform that enables healthcare organisations to safely deliver connected care while enhancing efficiencies across the clinical environment. The Medigate Platform spans the entire healthcare cybersecurity journey regardless of the scale or maturity of your environment.

  • Data Services

    MASS Consultants Ltd

    MASS has decades of experience and a proven track record delivering IT and data solutions via our Digital Services Group. We offer expertise, value for money and high quality service in all elements of IT and data provision, including but not limited to Computer and application hosting, Datamining, analysis tools.

  • iboss Zero Trust Secure Access Service Edge

    Phoenix Software Ltd

    iboss is a Zero Trust Edge.  iboss utilises a containerised cloud architecture allowing customers to easily migrate from legacy appliances, maintaining 100% dedicated IP address space in the cloud. Allowing for PDNS intergration, admin created GDPR Zones with dedicated UK datacentres. Packages include Core Filtering, Malware detection, Data Loss Prevention

  • CrowdStrike Application Security Posture Management

    INTEGRITY360 LIMITED

    CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • Emergency Services Case Management System

    Claritas Solutions Ltd

    Empower emergency services users with complete control of case management end-to-end requirements. Secure, scalable, with GDPR and DPA Pt3 compliance, hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Microsoft Sentinel SIEM Licences

    MONDAS CONSULTING LTD

    Purchase Microsoft Sentinel SIEM licences to utilise the power of Sentinel to collate log data from all of your Microsoft security tools and generate alarms for a SOC team to triage. Microsoft Sentinel can remediate these alarms using powerful automated playbook actions.

  • Check Point Harmony SASE

    INTEGRITY360 LIMITED

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • Keeper - Password Manager

    Network Utilities (Systems) Ltd

    Keeper is a password manager that securely stores, manages, and generates passwords. It uses encryption to protect passwords and other sensitive data, like credit card information and personal notes. Keeper offers features such as password generation, auto-fill, two-factor authentication, and secure sharing, across multiple platforms.

  • Computacenter - Proofpoint Core - P1 Bundle

    Computacenter (UK) Ltd

    Proofpoint P1 Bundle includes Email Protection (Secure Email Gateway antivirus and spam detection), Targeted Attack Protection (sandboxing and reporting), Threat Response Auto Pull (Mail Security Orchestration Automation Response) and Proofpoint Security Awareness Training (including phishing simulation).

  • Forescout Cloud: - Risk & Exposure Management (REM) - Threat Detection and Response (TDR)

    Softcat Limited

    The solution provides visibility and the cyber risk for any IP/MAC address connected cyber assets. Visualise the risk and compliance posture changes over time. Detect any cyber threats and orchestrate the response.

  • Sentinel PiNG

    YUDU Sentinel

    An independent communication and collaboration tool designed to replace social media chat applications. It is a corporate chat application that maintains records of all chats on central cloud servers for compliance with point to point encryption and encryption of stored chats. Used by senior management and crisis management teams.

  • Luciditi Passwordless Login Services (FIDO2)

    Arissian Ltd

    Quickly add FIDO2 Passwordless Biometric Authentication to your Applications using the Luciditi low-code SDK. In place of a password, a users’ unique biometrics such as fingerprints are used to generate a unique private key which is stored on a users device and is unique and used to access the application.

  • Kentico web content management

    Spindogs Ltd

    Kentico web content management. Mobile optimised, accessible development. Spindogs' Kentico CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.

  • Computacenter - CrowdStrike Falcon for IT

    Computacenter (UK) Ltd

    CrowdStrike Falcon® for IT, a module of the leading AI-native CrowdStrike Falcon® platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action.

  • Tanium Converged End Point Management (XEM)

    Khipu Networks Limited

    Visibility, control, compliance and remediation of endpoints in real-time, cloud-scale and autonomous - Tanium offers the only converged endpoint management (XEM) platform that combines end-to-end visibility, control, and remediation in one place.

  • CrowdStrike Falcon Counter Adversary Operations

    INTEGRITY360 LIMITED

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.

  • Proofpoint Threat Protection Suite

    Softcat Limited

    Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.

  • Keepnet Human Risk Management / Cyber Awareness Training

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Keepnet Labs focuses on cyber security, particularly human factors, using advanced technology and behavioural insights to enhance digital security across organisations. It provides comprehensive solutions for managing human-related security risks with tools like phishing simulators and incident response platforms, aiming to foster a proactive and resilient security culture.

  • Active Directory Compromised Password Monitoring

    PEGASUS LABS PTY LTD

    Pegasus Labs AD Protection stops users adding common or compromised passwords to their accounts, resets existing breached passwords and detects AD misconfigurations. It continually monitors and automatically responds to new breaches keeping Active Directory and Azure AD secure.

  • Mimecast Brand Exploit Protect

    CHESS ICT LIMITED

    Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.

  • DarkTrace Security Services

    The Server Labs Ltd.

    Darktrace AI interrupts in-progress cyber-attacks in seconds, including ransomware, email phishing, and threats to cloud environments and critical infrastructure. Join over 6,800 organizations worldwide that rely on a digital immune system to avoid cyber disruptions, without impacting regular business operations

  • CDW Check Point Harmony Endpoint

    CDW Limited

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Netsweeper Offsite Web Filter

    Netsweeper Inc.

    Part of the Netsweeper Education Ecosystem, works with the Netsweeper central platform to extend web filtering and digital monitoring to student devices, ensuring they remain protected when they leave the school’s network. It can be installed on Windows, OSX, Chrome, iOS and Android devices.

  • Technology Selection

    JBi Digital

    JBi Digital will guide you to build the optimal tech stack for your organisation with robust, scalable and secure solutions that are customised by certified professionals. Whether you’re updating entire systems or making targeted improvements, our approach is driven by your requirements and informed by in-depth user and system analysis.