Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1734 results found

1734 results found in Lot 2: Cloud software in the category Security risk management

  • Sophos Cloud Optix

    BYTES SOFTWARE SERVICES LIMITED

    "Sophos Cloud Optix, the Sophos Cloud Security Posture Management solution, proactively reduces business risk from unsanctioned activity, vulnerabilities, and misconfigurations across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform public cloud environments." bssgc

  • ESET and ESET M-EDR

    Grove Information Systems

    ESETs combination of spam filtering, anti-malware scanning, anti-phishing and cloud sandboxing helps protect organisations against infections and targeted attacks, as well as blocking new, never-before-seen types of threats, especially ransomware.

  • Cloud Based Identity as a Service Multi-Factor Authentication

    ENTRUST (EUROPE) LIMITED

    Entrust’s Cloud-Based Multi-Factor Authentication Platform, Identity as a Service, empowers organizations and users to secure access to cloud, legacy and on-premise apps while safeguarding enterprise assets. Identity as a Service is a full-scale, multi-factor authentication platform based in the cloud, suitable for user bases of all sizes.

  • Immersive Labs

    Immersive Labs

    True resilience requires people and teams work together. With a seamless and tailored experience for individuals, teams, and organization, we provide unmatched cybersecurity exercises and training, along with data-driven insights and guidance to improve resilience. Immersive provides enterprise-class scale, security, reliability, and integrations for the world's largest organizations.

  • Trust&Assure

    AVOCO SECURE LIMITED

    Avoco’s Orchestration and Decisioning Engine (ODE) is the technology behind Trust&Assure, a service that connects government services to Open Banking data, eWallets, CIFAS and other data sources, to deliver assured identity. Trust&Assure connects to your identity service to provide the data, verification, and deepfake checks to deliver secure services.

  • Automated Vulnerability and Penetration Testing Solution

    VE3 GLOBAL LTD

    Next-generation vulnerability management and world’s first CREST certified automated penetration testing platform performs around-the-clock penetration testing and predicts attack path scenarios. Low network footprint, discovery of vulnerabilities, testing many attack scenarios in a very short time ensuring an undisrupted network operation. Detailed reports together with proposed remediations of attack vectors.

  • Crypto Analysis

    MISCO TECHNOLOGIES LIMITED

    Explore. Investigate. Take Action. Reactor is the investigation software that connects cryptocurrency transactions to real-world entities. Examine criminal activity, such as the movement of stolen funds, as well as legitimate activity like flash loans and NFT transfers

  • Threat Intelligence - Recorded Future

    Bright Cyber (Voodoo technology LTD)

    Recorded Future is the world's most comprehensive independent threat intelligence cloud platform. This service enables organizations to identify and mitigate threats across cyber, supply chain, physical, and fraud domains with real-time, unbiased, and actionable intelligence. Options include integration with Tidal Cyber for heat mapping threat with defensive controls.

  • ZINC 'SYNAPSE'

    Zinc Digital Business Solutions Ltd

    ZINC 'SYNAPSE' is a intuitive solution crafted for organisations navigating high-risk and complex environments, safeguarding public safety, personnel, brand and assets. With features spanning incident management, mass communications, health and safety oversight, compliance activities, and security patrols, SYNAPSE consolidates operations into a unified platform.

  • Crowdstrike Falcon Complete MDR Licences

    MONDAS CONSULTING LTD

    Purchase Crowdstrike Falcon MDR licences to utilise the power of the Crowdstrike Falcon Complete MDR tool to protect your endpoints from Cyber Security threats. Receive 24x7 monitoring and response services from a team of Crowdstrike experts searching for signs of malicious activity on your network.

  • Palo Alto Cortex XDR

    XPERTEX LTD

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency.

  • SentinelOne EDR Licences

    MONDAS CONSULTING LTD

    Purchase SentinelOne EDR licences to utilise the power of the SentinelOne’s Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the SentinelOne EDR for signs of malicious activity on your network.

  • BlueVoyant - Supply Chain Defence Cyber Risk Management

    SOMERFORD ASSOCIATES LIMITED

    We help government organisations obtain clear visibility into cybersecurity risks across their supply chain by proactively identifying, prioritising and remediating cyber risks posed by business partners and supply chain relationships.

  • Proofpoint Security Awareness Training

    BYTES SOFTWARE SERVICES LIMITED

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence. bssgc

  • Sophos Intercept X Advanced

    INTEGRITY360 LIMITED

    Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. For virtual environments, a light agent for Windows Desktop VM’s provides off-board scanning and protection.

  • IT and Security Risk Management

    TMC3 LIMITED

    OneTrust IT & Security Risk Management transforms public sector security strategies with comprehensive risk identification, management, and mitigation capabilities. Our IT & Security Risk Management platform integrates seamlessly, enabling real-time risk assessment and promoting resilient, compliant operations.

  • Cloud IT Health Check Services

    LEIDOS INNOVATIONS UK LTD

    Leidos offers Cloud Health Check services to provide a holistic review of IT services and applications, assessing configuration, performance, security and scalability of cloud infrastructure. Our expert engineers/consultants work with you to determine scope, pain points, concerns and expected outcomes, followed by detailed discovery exercises, reporting and action plans.

  • Cyber Security

    I-NET SOFTWARE SOLUTIONS LTD

    We provide end2end cyber security services for desktop, mobile and cloud applications

  • Cybeready Autonomous Cyber Security Awareness Training

    SCG CORPORATE LIMITED

    An Autonomous Security Awareness Program Built For The Enterprise A complete, fully-managed training program that transforms security culture. Pairing the most advanced training solutions: including phishing simulation, awareness training & compliance.

  • Check Point Renewal

    NETWORK INTEGRATION TECHNOLOGIES LTD

    ITogether's Check Point Renewals service ensures continuous protection and performance by managing the renewal process of your Check Point security solutions. Our expert team provides timely updates, license management, and support, ensuring your cybersecurity measures remain robust, up-to-date, and aligned with evolving threats and compliance requirements.

  • Infosys Oracle Cloud Implementation, Support and Maintenance

    INFOSYS LIMITED

    Infosys help transform client’s strategies into viable technology-enabled outcomes through its various service offerings such as Consulting, Implementation, Support and Maintenance, Development & License Optimisation for below Oracle Cloud Products: 1. Financials (ERP) 2. HCM/Payroll 3. SCM 4. Sales & Marketing (CX) 5. BI & Analytics 6. PaaS

  • SolarWinds Log Analyzer (LA) License

    Prosperon Networks Ltd

    SolarWinds® Log Analyzer (LA) is a powerful log management tool, designed to fully integrate with the Orion Platform. With real-time log collection, analysis, and visualisation, you can quickly and easily gain out-of-the-box visibility into the performance and availability of your IT infrastructure.

  • Managed SOC Service

    Factory Internet Ltd

    Factory provide a Cloud Based SOC and SIEM Service. Our service has fully management and analyst support along with support for onboarding data. We provide full EDR/XDR functionality with Log Collection from Cloud, SaaS, Network and hundreds of different technologies.

  • Varonis Data Security Platform

    INTEGRITY360 LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation

  • CDW Proofpoint Core Plus Package

    CDW LIMITED

    Proofpoint's Core Plus package adds Email Fraud Defence, Secure Email Relay, and Supplier Threat Protection to the Core package offerings. Proofpoint CORE Plus - Requires CORE P0 or CORE P1

  • Neotas Investigative SaaS Platform copy

    NEOTAS LIMITED

    Neotas offers online investigative enhanced due diligence solutions through its AI-driven SaaS platform that harnesses the power of OSINT to identify, understand, and connect both structured, unstructured data across the surface, deep, and the dark web to help private and public sector analyse digital footprint of any given entity.

  • Tenable One - Enterprise

    PHOENIX SOFTWARE LIMITED

    Visibility across your attack surface, focus efforts to prevent attacks/accurately communicate cyber risk to support optimal business performance. Attack Path Analysis for breach & attack mitigation and External Attack Surface Management for insight into the external attack surface, allowing organizations to identify and reduce risks from the attacker’s perspective.

  • Crowdstrike Falcon Next Gen SIEM

    4 DATA SOLUTIONS LIMITED

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Netwrix Threat Manager

    INTEGRITY360 LIMITED

    Threat detection software from Netwrix to detect and respond to abnormal behavior and advanced attacks with high accuracy and speed

  • Web Application Firewall WAF

    SAPPHIRE TECHNOLOGIES LIMITED

    Web Application and API protection. Deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security. Whether your application is hosted in a data center or in a public/private cloud, decision engine covers, OWASP top ten attacks, API attacks and Bots