Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2514 results found

2514 results found in Lot 2: Cloud software in the category Security

  • Identity Threat Defense & Response (ITDR) - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Varonis SaaS Data Security Platform

    SOFTCAT PLC

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • Unify Mobile Detection System (UMDS) mobile phone removal for prison

    Unify Business Solutions Limited

    The Unify Mobile Detection System (UMDS) is an effective and affordable solution enabling covert mobile phone detection in a secure environment. Using surveillance instead of blocking, UMDS is 100% legal and provides an accurate solution to eliminate unwanted mobiles in prisons. The UMDS is undetectable and operates with autonomy 24/7.

  • Geopolitical Intelligence

    SAPPHIRE TECHNOLOGIES LIMITED

    Our service delivers critical insights into the shifting dynamics in every geographic area that matters to you. Accelerate your decision-making with contextualized OSINT data about geopolitical threats and trends. We fuse open source, dark web, technical sources, and original research. By dynamically linking, categorising, and updating intelligence in real time,

  • Sentinel Hotline

    YUDU Sentinel

    Automated Cloud based information lines for people to call in an incident. Reporting hotlines for messages and a message handling console. Deliver crisis updates by simply typing a message with AI conversion to Voice. 27 languages supported. A low cost call centre.

  • GBG IDscan Enterprise

    GB Group plc

    GBG IDscan’s configurable identity platform automatically recognises and classifies global Passports, ID Cards, Visas, Drivers Licenses and utility bills extracts all data fields and performs authentication checks. The technology including on-device or web SDKs, REST APIs and combined with NFC and NIST facial recognition and liveness to provide level confidence.

  • Computacenter - Proofpoint Complete Package

    Computacenter (UK) Ltd

    Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.

  • Palo Alto Prisma Services

    CYBIT LIMITED

    Prisma Cloud offers the industry’s broadest security and compliance coverage for applications, data, and the entire cloud native technology stack throughout the development lifecycle across multi- and hybrid cloud environments. This include: Prisma Cloud for cloud application security Prisma Access (SASE) Cloud access security Prisma SaaS for visibility and control

  • Flowmon by Progress

    SOFTCAT PLC

    Flowmon allows you to pinpoint the root cause of network problems, giving you complete network visibility and helps spot security threats such as Ransomware early in the attack chain with ease thanks to its AI-engine and unmatched flexibility - for on-premise, cloud and hybrid environments.

  • Digital twin management platform (Hybrid)

    CYBEXER TECHNOLOGIES

    The Digital Twin Management Platform (Hybrid) provides a public/private/hybrid cloud-based, scalable solution for global digital twin technology, enhancing cybersecurity and technology testing, R&D, and training. The platform enables flexible technology testing across various configurations, fostering innovation and supports real-world applications in a globally accessible, scalable environment.

  • Databricks Data Intelligence Platform

    Databricks, Inc.

    The Databricks Data Intelligence Platform integrates data warehouses, data lakes and AI into a unified "lakehouse," supporting diverse data types and AI workloads. Powered by an open-source foundation, it offers cohesive governance and security measures. Its Data Intelligence Engine ensures tailored insights, fostering organisation-wide data utilisation and AI adoption.

  • Decommissioning as a service CESG CAS-S Compliant (DaaS) (Hardware and Media destruction) copy

    Network 2 Supplies Ltd

    Decommissioning, data destruction and disposal of legacy equipment is central to managing a system migration to Cloud. N2S ensure any equipment or media that has previously been classified up to, and including, Official Sensitive, is destroyed and disposed of in line with CESG and WEEE regulations.

  • ProofPoint Secure Email Relay

    SOFTCAT PLC

    Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.

  • CDW Microsoft Entra ID P2

    CDW LIMITED

    In addition to the Free and P1 features, P2 also offers Azure Active Directory Identity Protection (risk-based Conditional Access), Privileged Identity Management to help discover, restrict, and monitor administrators and their access to resources and to provide just-in-time access when needed, and Identity Governance

  • Secure ServiceNow UK hosting

    Viewdeck Consulting Limited

    Service provides secure, UK hosted ServiceNow environments tailored for the UK public sector, ensuring data sovereignty and compliance.

  • Silverfort Unified Identity Protection Platform powered by BlueFort Evolve

    BLUEFORT SECURITY LIMITED

    Allows organisations to protect their Active Directory Environment and Users, by the use of user behaviour analysis, MFA, Service Account Protection and ITDR

  • Cloud Software & Support Services

    NIMBUS DIGITAL & TECHNOLOGY INNOVATIONS LTD

    Nimbus can provide Cloud Software & Support Services to meet your needs. Using our Nimbus Cloud Automation Pipelines (NCAP), we can quickly provision your Enterprise Scale Microsoft 365 Tenant ready to support the migration of your existing workloads or provide new cloud-ready workloads using policy-driven Infrastructure as Code pipelines.

  • CDW Proofpoint Essentials

    CDW LIMITED

    Proofpoint Essentials is a Secure Email Gateway (SEG) that includes AV antivirus, spam detection and authentication controls (SPF, DKIM and DMARC). Essentials does sandboxing of attachments and URLs as well as URL rewritting. Block advanced phishing, malware and imposter attacks with Proofpoint Essentials.

  • Armour Enterprise

    Armour Comms

    UK company providing NCSC CPA certified out of band secure mobile communications. iOS and Android smartphones and tablets, Windows desktops. Cost-effective, easy to use solution for governments. Secure voice, video, conferencing, instant messaging, group chat, file transfer, cross-domain, interoperability, auditable. Cloud-based or on-premises deployments UK OFFICIAL SENSITIVE, Advanced Mobile, SECRET.

  • Palo Alto Networks Prisma Cloud

    Khipu Networks Limited

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP). It provides the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multi-cloud environments.

  • Forcepoint Behaviour Analytics (FBA)

    CHESS ICT LIMITED

    Forcepoint Behavioral Analytics (FBA) enables security teams to proactively monitor for high risk behavior inside the enterprise. Uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud

  • CDW Crowdstrike Falcon for IT

    CDW LIMITED

    CrowdStrike Falcon® for IT, a module of the leading AI-native CrowdStrike Falcon® platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action

  • Mimecast Perimeter Defence Plan (Zone 1)

    BYTES SOFTWARE SERVICES LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization. bssgc

  • Proofpoint Cloud Application Security Broker CASB

    BYTES SOFTWARE SERVICES LIMITED

    Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition. bssgc

  • KnowBe4 Security Awareness Training (SAT)

    CM Security Ltd

    KnowBe4 is the world’s largest security awareness and compliance training and simulated social engineering platform. It combines the industry’s most comprehensive library of engaging, localised content, AI-driven simulated phishing and training recommendations, enterprise-grade reporting and robust user testing and assessments to drive awareness and change behaviour.

  • SaaS - Software as a Service

    Leicestershire Health Informatics Service

    Provision of software and the associated platform environment to provide a hosted software system. Fully managed server and software instances pre-configured with a range of operating systems, anti-virus, critical patches and back up routines in place. LHIS SaaS can be tailored to your own unique requirements.

  • Logpoint Converged SIEM and SOAR

    CHESS ICT LIMITED

    Logpoint's platform combines Security Incident and Event Management (SIEM), Security Orchestration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. It provides a comprehensive and centralised view of the security posture of an IT infrastructure

  • Forescout Zero Trust Assurance

    Cyberlab

    Zero Trust Assurance delivers an adaptive approach for constructing and reinforcing network resilience against unauthorized access and lateral threats with real-time insight over all connected devices - from automated policy enforcement, advanced segmentation, integration into the cybersecurity ecosystem, and the ability to swiftly respond to and recover from incidents

  • Passport as a Service (PaaS)

    ENTRUST (EUROPE) LIMITED

    Entrust's secure travel document issuance offering is a cost-effective solution supporting online security screening processes for passport enrollment and entitlement. The system facilitates electronic capture of application and supporting documentation. PaaS is based on Entrust's proven secure travel document solutions engine which has been in use since 1994.

  • Enterprise Mobility + Security E3

    VE3 GLOBAL LTD

    Cloud Enterprise Mobility + Security. Licensing suite includes Microsoft Azure Active Directory Premium P1, Microsoft Intune, Azure Information Protection Premium P1 and Microsoft Advanced Threat Analytics