Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2514 results found

2514 results found in Lot 2: Cloud software in the category Security

  • MTI Forcepoint ONE

    MTI TECHNOLOGY LIMITED

    Forcepoint ONE combines Zero Trust and SASE security technologies, including three secure access gateways and a variety of shared threat protection and data security services, all built on a cloud-native platform. This allows the public sector to adapt quickly to hybrid-working while keeping attackers out and sensitive data in.

  • Tessian ICES Email - Proofpoint copy

    BROOKCOURT SOLUTIONS LIMITED

    Proofpoint's Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • Computacenter - CrowdStrike Falcon Insight Extended Detection & Response (XDR)

    Computacenter (UK) Ltd

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • UK Identity, Right to Work (RTW), and Criminal Record Checking (DBS) Services

    VERIFILE LIMITED

    UK Criminal Record Check (DBS, Disclosure Scotland, PVG, AccessNI) services, UK Right to Work Checks, and Identity Verification. Verifile's secure platform enables employers to select UK and International background check services. Integration with the DBS Disclosure and Barring Service and Disclosure Scotland ensures fastest turnarounds for UK criminal record checks.

  • Bitdefender Gravityzone - Next-Gen Endpoint Antivirus

    Network Utilities (Systems) Ltd

    Bitdefender GravityZone Enterprise is a cybersecurity solution for organisations, offering advanced threat protection and endpoint security for devices like servers, desktops, and mobile devices. It combines anti-malware, anti-ransomware, and Endpoint Detection and Response (EDR) capabilities to defend against various cyber threats.

  • CDW Sophos Mobile (CMA)

    CDW LIMITED

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • Fingerprint Identification

    VIABLE DATA LTD

    Experts in biometrics and security controls, Viable Data offer fingerprint identification services that can be used alone or as part of Multi-Biometric Factor Authentication. Due to its accuracy and reliability, fingerprint identification is suitable for law enforcement, immigration and border control, and access control settings.

  • MLL Unified Communications as a Sevice

    MLL Telecom Ltd.

    MLL’s Unified Communications telephony cloud platform provides feature-rich services providing all the benefits and more of a traditional on-premise appliance. MLL’s UCaaS service allows buyers to migrate from a legacy system to a new digital solution with additional options available such as omnichannel contact centre including EMIS and Microsoft integration.

  • Auth0 (Okta) Licences

    Innovate IT Ltd

    Innovate is a certified Okta delivery partner, delivering Okta WIC and CIC (Auth0). We can help you purchase your licences, whilst offering expert advice on what you need to achieve your business goals. Okta connects any person with any application on any device. It's the market leading (GARTNER) identity platform.

  • boxxe M365 for Frontline workers - F3

    BOXXE LIMITED

    Microsoft 365 F3 is a complete, intelligent solution that combines Office 365, Windows 10 Enterprise, and Enterprise Mobility + Security to extend the Microsoft 365 service value across entire customer organizations. It empowers frontline Workers to be creative and work together, securely.

  • Amazon WorkMail

    SOFTCAT PLC

    Amazon WorkMail is a secure, managed business email and calendar service with support for existing desktop and mobile email client applications. Amazon WorkMail gives users the ability to seamlessly access their email, contacts, and calendars using the client application of their choice.

  • Barracuda Email Protection Premium Plus

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware and more sophisticated phishing attacks while also giving ability to protect data from accidental deletion and compliance via archiving.

  • Barracuda Email Protection

    Central Networks and Technologies Ltd

    Barracuda Email Protection provides the most comprehensive protection against all 13 email threat types, from spam and ransomware to socially engineered threats such as spear phishing, business email compromise, and account takeover.

  • CDW Check Point CloudGuard Network Security - For Azure Virtual WAN (CGNS vWAN)

    CDW LIMITED

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.

  • Forcepoint Cloud Access Security Broker (CASB)

    SAPPHIRE TECHNOLOGIES LIMITED

    Forcepoint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and. Information assurance restrictions on using the Cloud.

  • Akamai Trafficpeak

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Mimecast - Comprehensive Defense Plan (Zone 1+2)

    PHOENIX SOFTWARE LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • E-Commerce Web development and CRM Support

    DBAAS LTD

    As an eCommerce website developer with SEO optimized features, we work with the latest technology. We offer all the services that eCommerce businesses need under one roof at DBaaS Ltd. AbanteCard,Drupal, Joomla, Magento, Open Cart,Prestashop,Shopify,Woo Commerce,and WordPress are just a few of the applications we provide on the DBaaS platform.

  • Barracuda SecureEdge (SASE)

    PRIMESYS LTD

    Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, anytime, anywhere, providing security inspection and policy enforcement in the cloud, at branch, or on device. Barracuda SecureEdge delivers enterprise-grade security including Zero Trust Network Access (ZTNA), Firewall-as-a-Service, web security, fully-integrated office connectivity with Secure SD-WAN.

  • PSAT Security Awareness Training - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • Wiz

    SOFTCAT PLC

    Wiz is a CNAPP security platform that helps customers protect everything they build and run in the cloud, providing full-stack agentless cross-cloud support for AWS, Azure, GCP, OCI and Kubernetes. Providing Wiz Code, Wiz Sensor and Wiz Premium Support

  • Evolve Security Automation

    2T SECURITY LTD

    Evolve delivers on-demand specialist security capabilities that augment your teams, build security capabilities into your business, and maximize security budgets delivering greater coverage and improved security posture of your business. This removes the need to hire additional employees, enabling your existing team to focus their time on strategic security activities.

  • Netwrix Recover for Active Directory

    INTEGRITY360 LIMITED

    Netwrix Recovery for ActiveDirectory helps organizations avoid security breaches and business disruptions by enabling administrators to quickly revert entire AD objects or just a single attribute to a known good state, without downtime. This comprehensive solution handles AD objects, attributes, group memberships, DNS entries, Group Policy objects (GPOs), and more

  • Nedap Access Control provided by Reliance High-Tech

    Reliance High-Tech Ltd

    Nedap access control solution hosted in the cloud. Providing app integration, multiple access control methods and integrations.

  • Barrier Networks Secure Data Workflow (OPSWAT MetaDefender)

    Barrier Networks

    MetaDefender is used by organizations that require the highest level of security, including critical infrastructure, government agencies, and financial institutions, to enable a secure way to get files in and out of an organization, and prevent cyber security threats.

  • Alert Management Solution

    GET SWARMS LIMITED

    Swarms Alert Management Solution is designed to handle notifications and alarms within an organization. Includes intelligent alert prioritization, automated responses, real-time monitoring, ensuring swift resolution of critical issues. Seamlessly integrating with current systems, it centralizes alert management, reducing downtime, improving response times, and boosting operational efficiency.

  • Recycling of ICT, Telecomms & Cable to WEEE and EA Regulation Standards

    Network 2 Supplies Ltd

    N2S are the leaders in pursuit of zero waste technology, delivering a disposal service that consistently returns technology waste to maximum re-use. We can offer secure collection bins for use in data centre environments. These are then transported to N2S where the data is cleansed and the drives destroyed.

  • BeyondTrust Privileged Password Management

    PHOENIX SOFTWARE LIMITED

    BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts.

  • Crisis Simulation Service

    Core to Cloud Ltd

    Improve your organisation's resilience and ability to respond to cyberattack incidents and threats through the delivery of a series of crisis simulation exercises. The exercises are gamified with organisation relevant, interactive questions on a web interface. Full reports are shared to highlight performance and areas of improvement.

  • Forcepoint Data Guard

    Cyberlab

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.