Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1728 results found

1728 results found in Lot 2: Cloud software in the category Security risk management

  • Teramind - Compliance, Security and Productivity

    SCG CORPORATE LIMITED

    Data Loss Prevention (DLP) is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection techniques, and contextual analysis to identify and categorize sensitive data and IP.

  • Digital Managed Services (hosting, support and maintenance)

    PANLOGIC LIMITED

    Hosting (physical vs. virtualised vs. cloud; shared vs. dedicated) Infrastructure support Application support Maintenance Digital infrastructure audit Disaster Recovery (DR) & 'hot'/'warm'/'cold' High availability (managing demand) Managed Services audit (investigation), migration (taking on third-party services) and Business As Usual (BAU)

  • IBM OpenPages with Watson

    IBM UNITED KINGDOM LIMITED

    IBM OpenPages with Watson is an AI-driven, highly scalable governance, risk and compliance (GRC) solution that runs on any cloud. Centralize siloed risk management functions within a single environment designed to help you identify, manage, monitor and report on risk and regulatory compliance, especially in today’s changing business landscape.

  • Computacenter - ProofPoint Archive

    Computacenter (UK) Ltd

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.

  • TrustedFilter®

    4SECURE LIMITED

    TrustedFilter transforms, inspects, and filters a wide spectrum of data types and protocols such that only 'known good' data is allowed to cross network boundaries and between networks of different trust. We also provide file content disarm and reconstruction to sanitise files during transfer.

  • ICT and Telecoms Installation

    Network 2 Supplies Ltd

    N2S are specialists in large scale multi-site ICT installations, including desktops, screens, unified comms/telephony and managed print. Utilise a fleet of tracked vehicles to return equipment to headquarters for WEEE recycling or resale.

  • Oracle Cloud BAU Support

    SERA NEON LIMITED

    Support Local Government end-users and the Business/Operations team with Oracle Cloud incidents—local Government expertise, supporting Business and System experts. Recent success includes onboarding a London Borough for Managed services and successfully transitioning from the outgoing Solution Integrator. ITIL/SWOT analysis for LocalGov Programmes. Automation utilities, ITSM tool.

  • Darktrace Antigena

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Darktrace Antigena is the world’s first proven Autonomous Response technology for the enterprise. The system operates as an AI decision-making framework that neutralises fast-moving and unpredictable attacks in seconds, while sustaining normal operations by design.

  • CDW Proofpoint Threat Protection Suite

    CDW LIMITED

    Proofpoint Threat Protection Suite is made up of Email Protection and Targeted Attack Protection (TAP). Email Protection (SEG Secure Email Gateway) includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP includes sandboxing attachments and URLs as well as URL rewritting and BEC Business Email Compromise detection.

  • Censornet Web Security (SWG)

    CM Security Ltd

    Censornet Web Security safeguards organisations from online threats by filtering web traffic. It offers URL filtering, malware detection, content inspection, and real-time threat intelligence for secure internet usage. Granular control over web access policies ensures compliance and risk mitigation.

  • Tenable Lumin

    INTEGRITY360 LIMITED

    Calculate, communicate and compare your cyber risk.

  • Secure Email Relay - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.

  • OPSWAT - MetaDefender Core

    NETWORK INTEGRATION TECHNOLOGIES LTD

    OPSWAT's MD-Core consists of Multiscannng, Deep CDR, Filescan (Sandbox), DLP, File Based Vulnerability, Software Supply Chain for the protection against malware threats. OPSWAT has complimentary products and features such as Managed File Transfer (aka Vault), Diode Technology (CDS, IDG), and an umber of Access and IOT Solutions.

  • CheckPoint CloudGuard Cloud Security Posture Management

    BYTES SOFTWARE SERVICES LIMITED

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks. bssgc

  • Tenable Vulnerability Management (formerly Tenable.io)

    SOFTCAT PLC

    Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.

  • Vulnerability Management Solution

    GET SWARMS LIMITED

    GetSwarms provides an intuitive, cloud-based Vulnerability Management system that is easy to set up and deploy. It conducts comprehensive scans of your network, assets, and the deep web to identify potential security risks. The system also ensures compliance with industry standards, helping organizations protect their infrastructure and data effectively.

  • Protective DNS Local Reporting

    PEGASUS LABS PTY LTD

    When using a Protective or Filtering DNS service, these only identify which DNS queries were blocked not the source device on your local network. This service allows you to automatically track down and report on compromised devices inside your network, including IP address and device name.

  • Recorded Future Threat Intelligence

    SAPPHIRE TECHNOLOGIES LIMITED

    Criminals often impersonate an organisation and many citizens aren't aware that .gov.uk is the norm for public sector organisations. This service monitors for similar web sites using non authorised domains and provided optional take down services

  • ServiceNow® implementation, software and licensing

    FLYFORM LTD

    ServiceNow implementation and software. A portfolio of robust cloud-based applications that automate and manage enterprise services providing a complete ServiceNow ITSM solution. Our applications have the advantage of being built on a single service automation platform with one user interface, one code base, one data model, delivering easy, automated upgrades.

  • HSE Incident Management

    OFFICELABS LIMITED

    The Incident management application supports the process by which companies identify, prevent, respond to, record, and analyse health and safety risks in the workplace. Providing a way to record and report activity and use workflow to action any follow on activities. Includes intuitive forms and comprehensive reporting.

  • Check Point Harmony SASE

    SOFTCAT PLC

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • Secure Azure Sandbox for UK Government: Air-Gapped Data Science & Processing

    WR LOGIC LIMITED

    Our service offers a secure, air-gapped sandbox for data science and processing, tailored for national security departments. It ensures maximum data isolation and protection using Azure Stack Hub, Azure Synapse Analytics, Azure Data Factory, and Azure Databricks, among other technologies.

  • Threat Intelligence - Recorded Future

    BROOKCOURT SOLUTIONS LIMITED

    Recorded Future is the most comprehensive and independent threat intelligence cloud platform. They enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.

  • Centripetal CLEANInternet

    4 DATA SOLUTIONS LIMITED

    CleanINTERNET® is an intelligence-powered security solution that leverages the world's most comprehensive Threat Intelligence (TI) database combined with a team of TI operatives to provide an unprecedented level of protection at the perimeter. An order of magnitude faster than NGFWs, CLEANInternet is essential as part of your Secure Boundary strategy.

  • Fortra's Classifier Suite FCS (Formerly Boldon James) - From HANDD Business Solutions

    HANDD Business Solutions

    Fortra's Classifier Suite FCS (Boldon James) allows you to organise and label data according to sensitivity and importance, across platforms and devices. Protect sensitive information by assigning persistent metadata labels like "Confidential" or "Public", alongside rich context labels. FCS aids in enforcing data security policies and ensures compliance with regulations.

  • Spirion DSPM Data Discovery & Classification - From HANDD Business Solutions

    HANDD Business Solutions

    Spirion's Sensitive Data Platform (SDP) provides Privacy Grade™ data discovery and purposeful classification in a highly scalable SaaS hybrid architecture, that thoroughly scans both on-premises endpoints/servers and cloud repositories at enterprise scale. It automatically discovers, classifies, and remediates almost any form of sensitive data anywhere on-premises, the cloud, and endpoints.

  • Heimdal Security - Next-gen Antivirus, Ransomware Encryption Protection, Patch Manager & 24/7 SOC

    BITZ 'N' PC'Z LIMITED

    Heimdal Security elevates your digital defense, seamlessly integrating powerful anti-virus and firewall capabilities with cutting-edge ransomware protection and vulnerability management, ensuring unparalleled security for your data and systems. This bundle includes: • Next-Gen Anti-Virus, Firewall & MDM • Ransomware Encryption Protection • Patch & Asset Management • 24/7 Monitoring

  • Sophos Cloud Optix

    BYTES SOFTWARE SERVICES LIMITED

    "Sophos Cloud Optix, the Sophos Cloud Security Posture Management solution, proactively reduces business risk from unsanctioned activity, vulnerabilities, and misconfigurations across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform public cloud environments." bssgc

  • ESET and ESET M-EDR

    Grove Information Systems

    ESETs combination of spam filtering, anti-malware scanning, anti-phishing and cloud sandboxing helps protect organisations against infections and targeted attacks, as well as blocking new, never-before-seen types of threats, especially ransomware.

  • Cloud Based Identity as a Service Multi-Factor Authentication

    ENTRUST (EUROPE) LIMITED

    Entrust’s Cloud-Based Multi-Factor Authentication Platform, Identity as a Service, empowers organizations and users to secure access to cloud, legacy and on-premise apps while safeguarding enterprise assets. Identity as a Service is a full-scale, multi-factor authentication platform based in the cloud, suitable for user bases of all sizes.