Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2472 results found

2472 results found in Lot 2: Cloud software in the category Security

  • PSAT Security Awareness Training - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • Wiz

    SOFTCAT PLC

    Wiz is a CNAPP security platform that helps customers protect everything they build and run in the cloud, providing full-stack agentless cross-cloud support for AWS, Azure, GCP, OCI and Kubernetes. Providing Wiz Code, Wiz Sensor and Wiz Premium Support

  • Evolve Security Automation

    2T SECURITY LTD

    Evolve delivers on-demand specialist security capabilities that augment your teams, build security capabilities into your business, and maximize security budgets delivering greater coverage and improved security posture of your business. This removes the need to hire additional employees, enabling your existing team to focus their time on strategic security activities.

  • Netwrix Recover for Active Directory

    INTEGRITY360 LIMITED

    Netwrix Recovery for ActiveDirectory helps organizations avoid security breaches and business disruptions by enabling administrators to quickly revert entire AD objects or just a single attribute to a known good state, without downtime. This comprehensive solution handles AD objects, attributes, group memberships, DNS entries, Group Policy objects (GPOs), and more

  • Nedap Access Control provided by Reliance High-Tech

    Reliance High-Tech Ltd

    Nedap access control solution hosted in the cloud. Providing app integration, multiple access control methods and integrations.

  • Barrier Networks Secure Data Workflow (OPSWAT MetaDefender)

    Barrier Networks

    MetaDefender is used by organizations that require the highest level of security, including critical infrastructure, government agencies, and financial institutions, to enable a secure way to get files in and out of an organization, and prevent cyber security threats.

  • Alert Management Solution

    GET SWARMS LIMITED

    Swarms Alert Management Solution is designed to handle notifications and alarms within an organization. Includes intelligent alert prioritization, automated responses, real-time monitoring, ensuring swift resolution of critical issues. Seamlessly integrating with current systems, it centralizes alert management, reducing downtime, improving response times, and boosting operational efficiency.

  • Recycling of ICT, Telecomms & Cable to WEEE and EA Regulation Standards

    Network 2 Supplies Ltd

    N2S are the leaders in pursuit of zero waste technology, delivering a disposal service that consistently returns technology waste to maximum re-use. We can offer secure collection bins for use in data centre environments. These are then transported to N2S where the data is cleansed and the drives destroyed.

  • BeyondTrust Privileged Password Management

    PHOENIX SOFTWARE LIMITED

    BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts.

  • Crisis Simulation Service

    Core to Cloud Ltd

    Improve your organisation's resilience and ability to respond to cyberattack incidents and threats through the delivery of a series of crisis simulation exercises. The exercises are gamified with organisation relevant, interactive questions on a web interface. Full reports are shared to highlight performance and areas of improvement.

  • Forcepoint Data Guard

    Cyberlab

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • Identity Threat Defense & Response (ITDR) - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Varonis SaaS Data Security Platform

    SOFTCAT PLC

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • Unify Mobile Detection System (UMDS) mobile phone removal for prison

    Unify Business Solutions Limited

    The Unify Mobile Detection System (UMDS) is an effective and affordable solution enabling covert mobile phone detection in a secure environment. Using surveillance instead of blocking, UMDS is 100% legal and provides an accurate solution to eliminate unwanted mobiles in prisons. The UMDS is undetectable and operates with autonomy 24/7.

  • Geopolitical Intelligence

    SAPPHIRE TECHNOLOGIES LIMITED

    Our service delivers critical insights into the shifting dynamics in every geographic area that matters to you. Accelerate your decision-making with contextualized OSINT data about geopolitical threats and trends. We fuse open source, dark web, technical sources, and original research. By dynamically linking, categorising, and updating intelligence in real time,

  • Sentinel Hotline

    YUDU Sentinel

    Automated Cloud based information lines for people to call in an incident. Reporting hotlines for messages and a message handling console. Deliver crisis updates by simply typing a message with AI conversion to Voice. 27 languages supported. A low cost call centre.

  • GBG IDscan Enterprise

    GB Group plc

    GBG IDscan’s configurable identity platform automatically recognises and classifies global Passports, ID Cards, Visas, Drivers Licenses and utility bills extracts all data fields and performs authentication checks. The technology including on-device or web SDKs, REST APIs and combined with NFC and NIST facial recognition and liveness to provide level confidence.

  • Computacenter - Proofpoint Complete Package

    Computacenter (UK) Ltd

    Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.

  • Palo Alto Prisma Services

    CYBIT LIMITED

    Prisma Cloud offers the industry’s broadest security and compliance coverage for applications, data, and the entire cloud native technology stack throughout the development lifecycle across multi- and hybrid cloud environments. This include: Prisma Cloud for cloud application security Prisma Access (SASE) Cloud access security Prisma SaaS for visibility and control

  • Flowmon by Progress

    SOFTCAT PLC

    Flowmon allows you to pinpoint the root cause of network problems, giving you complete network visibility and helps spot security threats such as Ransomware early in the attack chain with ease thanks to its AI-engine and unmatched flexibility - for on-premise, cloud and hybrid environments.

  • Digital twin management platform (Hybrid)

    CYBEXER TECHNOLOGIES

    The Digital Twin Management Platform (Hybrid) provides a public/private/hybrid cloud-based, scalable solution for global digital twin technology, enhancing cybersecurity and technology testing, R&D, and training. The platform enables flexible technology testing across various configurations, fostering innovation and supports real-world applications in a globally accessible, scalable environment.

  • Databricks Data Intelligence Platform

    Databricks, Inc.

    The Databricks Data Intelligence Platform integrates data warehouses, data lakes and AI into a unified "lakehouse," supporting diverse data types and AI workloads. Powered by an open-source foundation, it offers cohesive governance and security measures. Its Data Intelligence Engine ensures tailored insights, fostering organisation-wide data utilisation and AI adoption.

  • Decommissioning as a service CESG CAS-S Compliant (DaaS) (Hardware and Media destruction) copy

    Network 2 Supplies Ltd

    Decommissioning, data destruction and disposal of legacy equipment is central to managing a system migration to Cloud. N2S ensure any equipment or media that has previously been classified up to, and including, Official Sensitive, is destroyed and disposed of in line with CESG and WEEE regulations.

  • ProofPoint Secure Email Relay

    SOFTCAT PLC

    Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.

  • CDW Microsoft Entra ID P2

    CDW LIMITED

    In addition to the Free and P1 features, P2 also offers Azure Active Directory Identity Protection (risk-based Conditional Access), Privileged Identity Management to help discover, restrict, and monitor administrators and their access to resources and to provide just-in-time access when needed, and Identity Governance

  • Silverfort Unified Identity Protection Platform powered by BlueFort Evolve

    BLUEFORT SECURITY LIMITED

    Allows organisations to protect their Active Directory Environment and Users, by the use of user behaviour analysis, MFA, Service Account Protection and ITDR

  • Cloud Software & Support Services

    NIMBUS DIGITAL & TECHNOLOGY INNOVATIONS LTD

    Nimbus can provide Cloud Software & Support Services to meet your needs. Using our Nimbus Cloud Automation Pipelines (NCAP), we can quickly provision your Enterprise Scale Microsoft 365 Tenant ready to support the migration of your existing workloads or provide new cloud-ready workloads using policy-driven Infrastructure as Code pipelines.

  • CDW Proofpoint Essentials

    CDW LIMITED

    Proofpoint Essentials is a Secure Email Gateway (SEG) that includes AV antivirus, spam detection and authentication controls (SPF, DKIM and DMARC). Essentials does sandboxing of attachments and URLs as well as URL rewritting. Block advanced phishing, malware and imposter attacks with Proofpoint Essentials.

  • Armour Enterprise

    Armour Comms

    UK company providing NCSC CPA certified out of band secure mobile communications. iOS and Android smartphones and tablets, Windows desktops. Cost-effective, easy to use solution for governments. Secure voice, video, conferencing, instant messaging, group chat, file transfer, cross-domain, interoperability, auditable. Cloud-based or on-premises deployments UK OFFICIAL SENSITIVE, Advanced Mobile, SECRET.

  • Palo Alto Networks Prisma Cloud

    Khipu Networks Limited

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP). It provides the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multi-cloud environments.