Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1734 results found

1734 results found in Lot 2: Cloud software in the category Security risk management

  • Tessian DLP

    SOFTCAT PLC

    Adaptive Email DLP uses behavioural AI to learn about your employees’ normal email sending behaviours, their trusted relationships and how they communicate sensitive data. It then analyses each email to detect anomalous behaviour, notifying admins of potential data loss incidents. warn users in real-time, prevent sensitive data loss through email.

  • Cloudlake Backup - Veeam Software as a Service

    AUTODATA PRODUCTS LIMITED

    Veeam software ensures that you can backup all workloads regardless of whether they are on premise, in the cloud or within a SaaS provider. Autodata’s Cloudlake Backup service ensures that you can protect every workload, regardless of location, whilst reducing costs and having support from an award-winning Veeam partner.

  • COOLSPIRiT a Databarracks Company: Illumio - Network Micro Segmentation

    COOLSPIRiT, a Databarracks company

    Safeguard your organisation, stop digital attacks in their tracks. Illumio provides the only proven segmentation product suite purpose-built for Zero Trust security. Illumio has pioneered an unprecedented way to orchestrate Zero Trust segmentation down to the application and workload level, identifying and easily blocking pathways of attack to digital operations.

  • Teramind - Compliance, Security and Productivity

    SCG CORPORATE LIMITED

    Data Loss Prevention (DLP) is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection techniques, and contextual analysis to identify and categorize sensitive data and IP.

  • Digital Managed Services

    PANLOGIC LIMITED

    Hosting (physical vs. virtualised vs. cloud; shared vs. dedicated) Infrastructure support Application support Maintenance Digital infrastructure audit Disaster Recovery (DR) & 'hot'/'warm'/'cold' High availability (managing demand) Managed Services audit (investigation), migration (taking on third-party services) and Business As Usual (BAU)

  • IBM OpenPages with Watson

    IBM UNITED KINGDOM LIMITED

    IBM OpenPages with Watson is an AI-driven, highly scalable governance, risk and compliance (GRC) solution that runs on any cloud. Centralize siloed risk management functions within a single environment designed to help you identify, manage, monitor and report on risk and regulatory compliance, especially in today’s changing business landscape.

  • Computacenter - ProofPoint Archive

    Computacenter (UK) Ltd

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.

  • TrustedFilter®

    4SECURE LIMITED

    TrustedFilter transforms, inspects, and filters a wide spectrum of data types and protocols such that only 'known good' data is allowed to cross network boundaries and between networks of different trust. We also provide file content disarm and reconstruction to sanitise files during transfer.

  • ICT and Telecoms Installation

    Network 2 Supplies Ltd

    N2S are specialists in large scale multi-site ICT installations, including desktops, screens, unified comms/telephony and managed print. Utilise a fleet of tracked vehicles to return equipment to headquarters for WEEE recycling or resale.

  • Oracle Cloud BAU Support

    SERA NEON LIMITED

    Oracle Cloud BAU Support. Programme-BAU Transition. Support end-users and the Business/Operations team with Oracle Cloud Functional and Technical incidents. Manage the BAU Service desk, including incident triaging. Manage the complete incident-to-deployment lifecycle. Working collaboratively with the business ensures robust enablement and continuous service improvement.

  • Darktrace Antigena

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Darktrace Antigena is the world’s first proven Autonomous Response technology for the enterprise. The system operates as an AI decision-making framework that neutralises fast-moving and unpredictable attacks in seconds, while sustaining normal operations by design.

  • CDW Proofpoint Threat Protection Suite

    CDW LIMITED

    Proofpoint Threat Protection Suite is made up of Email Protection and Targeted Attack Protection (TAP). Email Protection (SEG Secure Email Gateway) includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP includes sandboxing attachments and URLs as well as URL rewritting and BEC Business Email Compromise detection.

  • Censornet Web Security (SWG)

    CM Security Ltd

    Censornet Web Security safeguards organisations from online threats by filtering web traffic. It offers URL filtering, malware detection, content inspection, and real-time threat intelligence for secure internet usage. Granular control over web access policies ensures compliance and risk mitigation.

  • Tenable Lumin

    INTEGRITY360 LIMITED

    Calculate, communicate and compare your cyber risk.

  • Secure Email Relay - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.

  • OPSWAT - MetaDefender Core

    NETWORK INTEGRATION TECHNOLOGIES LTD

    OPSWAT's MD-Core consists of Multiscannng, Deep CDR, Filescan (Sandbox), DLP, File Based Vulnerability, Software Supply Chain for the protection against malware threats. OPSWAT has complimentary products and features such as Managed File Transfer (aka Vault), Diode Technology (CDS, IDG), and an umber of Access and IOT Solutions.

  • CheckPoint CloudGuard Cloud Security Posture Management

    BYTES SOFTWARE SERVICES LIMITED

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks. bssgc

  • Tenable Vulnerability Management (formerly Tenable.io)

    SOFTCAT PLC

    Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.

  • Vulnerability Management Solution

    GET SWARMS LIMITED

    GetSwarms provides an intuitive, cloud-based Vulnerability Management system that is easy to set up and deploy. It conducts comprehensive scans of your network, assets, and the deep web to identify potential security risks. The system also ensures compliance with industry standards, helping organizations protect their infrastructure and data effectively.

  • Protective DNS Local Reporting

    PEGASUS LABS PTY LTD

    When using a Protective or Filtering DNS service, these only identify which DNS queries were blocked not the source device on your local network. This service allows you to automatically track down and report on compromised devices inside your network, including IP address and device name.

  • Recorded Future Threat Intelligence

    SAPPHIRE TECHNOLOGIES LIMITED

    Criminals often impersonate an organisation and many citizens aren't aware that .gov.uk is the norm for public sector organisations. This service monitors for similar web sites using non authorised domains and provided optional take down services

  • ServiceNow® implementation, software and licensing

    FLYFORM LTD

    ServiceNow implementation and software. A portfolio of robust cloud-based applications that automate and manage enterprise services providing a complete ServiceNow ITSM solution. Our applications have the advantage of being built on a single service automation platform with one user interface, one code base, one data model, delivering easy, automated upgrades.

  • HSE Incident Management

    OFFICELABS LIMITED

    The Incident management application supports the process by which companies identify, prevent, respond to, record, and analyse health and safety risks in the workplace. Providing a way to record and report activity and use workflow to action any follow on activities. Includes intuitive forms and comprehensive reporting.

  • Check Point Harmony SASE

    SOFTCAT PLC

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • Secure Azure Sandbox for UK Government: Air-Gapped Data Science & Processing

    WR LOGIC LIMITED

    Our service offers a secure, air-gapped sandbox for data science and processing, tailored for national security departments. It ensures maximum data isolation and protection using Azure Stack Hub, Azure Synapse Analytics, Azure Data Factory, and Azure Databricks, among other technologies.

  • Threat Intelligence - Recorded Future

    BROOKCOURT SOLUTIONS LIMITED

    Recorded Future is the most comprehensive and independent threat intelligence cloud platform. They enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.

  • Centripetal CLEANInternet

    4 DATA SOLUTIONS LIMITED

    CleanINTERNET® is an intelligence-powered security solution that leverages the world's most comprehensive Threat Intelligence (TI) database combined with a team of TI operatives to provide an unprecedented level of protection at the perimeter. An order of magnitude faster than NGFWs, CLEANInternet is essential as part of your Secure Boundary strategy.

  • Fortra's Classifier Suite FCS (Formerly Boldon James) - From HANDD Business Solutions

    HANDD Business Solutions

    Fortra's Classifier Suite FCS (Boldon James) allows you to organise and label data according to sensitivity and importance, across platforms and devices. Protect sensitive information by assigning persistent metadata labels like "Confidential" or "Public", alongside rich context labels. FCS aids in enforcing data security policies and ensures compliance with regulations.

  • Spirion DSPM Data Discovery & Classification - From HANDD Business Solutions

    HANDD Business Solutions

    Spirion's Sensitive Data Platform (SDP) provides Privacy Grade™ data discovery and purposeful classification in a highly scalable SaaS hybrid architecture, that thoroughly scans both on-premises endpoints/servers and cloud repositories at enterprise scale. It automatically discovers, classifies, and remediates almost any form of sensitive data anywhere on-premises, the cloud, and endpoints.

  • Heimdal Security - Next-gen Antivirus, Ransomware Encryption Protection, Patch Manager & 24/7 SOC

    BITZ 'N' PC'Z LIMITED

    Heimdal Security elevates your digital defense, seamlessly integrating powerful anti-virus and firewall capabilities with cutting-edge ransomware protection and vulnerability management, ensuring unparalleled security for your data and systems. This bundle includes: • Next-Gen Anti-Virus, Firewall & MDM • Ransomware Encryption Protection • Patch & Asset Management • 24/7 Monitoring