Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Barrier Networks Centri for Cisco Security Service Edge (SSE)

    BARRIER NETWORKS LIMITED

    Managed Security Service Edge from Barrier helps organizations provide secure connectivity for hybrid workforces, protecting corporate resources from cyberattacks and data-loss. Cisco Powered Service.

  • CDW AvePoint Cloud Governance for Microsoft 365

    CDW LIMITED

    M365 is an essential productivity solution millions of people use every day. With that use comes significant challenges in how you can scale your management and security of the platform. Implement an extensible governance framework that empowers users, is easy to maintain, and scales with your organization.

  • Proofpoint Core Plus Package

    SOFTCAT PLC

    Proofpoint's Core Plus package adds Email Fraud Defence, Secure Email Relay, and Supplier Threat Protection to the Core package offerings.

  • CheckPoint CloudGuard Network Security (CGNS)

    SOFTCAT PLC

    CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.

  • Splunk Threat Detection Investigation and Response Suite

    BYTES SOFTWARE SERVICES LIMITED

    Use any or all of Splunk’s Security products and services together to provide a unified security operations solution. On top of Splunk Enterprise or Splunk Cloud, combine Enterprise Security (SIEM), Mission Control, Splunk Attack Analyser (SAA), Splunk Threat Intelligence Management (TIM), Splunk SOAR, and Splunk UBA. bssgc

  • Logit.io Metrics as a Service and Observability

    LOGIT.IO LTD

    The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • CrowdStrike Falcon Endpoint Detection & Response (EDR)

    INTEGRITY360 LIMITED

    Falcon EDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • MTI Quest

    MTI TECHNOLOGY LIMITED

    Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard.

  • CDW Cisco Full Stack Observability (FSO)

    CDW LIMITED

    Full-Stack Observability by Cisco moves beyond domain monitoring into full-stack visibility, insights, and actions, transforming siloed data into actionable insights that provide shared context for your IT teams, giving you the power to prioritise your actions so you can deliver flawless customer experiences that drive revenue while accelerating digital transformation.

  • Qualys Cloud Platform (QCP)

    INTEGRITY360 LIMITED

    Qualys Cloud Platform consists of a suite of IT security and compliance solutions delivered via SaaS deployment model that leverages shared and extensible core services. The solution allows customers to continuously monitor their hybrid environments for Vulnerabilities, compliance, misconfigurations, automate remediation with the aim of reducing organisational risk.

  • Sophos Zero Trust Network Access (ZTNA)

    CHESS ICT LIMITED

    Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users.

  • Micro Focus, now OpenText - ArcSight with Real-Time Threat Detection on SaaS

    MICRO FOCUS SOFTWARE UK LTD

    ArcSight SIEM-as-a-Service with Real-Time Threat Detection (Detect) is a real-time correlation and threat alerting system that increases SOC analyst awareness of critical security incidents in their environment. Detect enables SOC analysts to create correlation rules that generate alerts when specific conditions occur within their event logs.

  • Tenable Attack Surface Management (formerly Tenable.asm)

    INTEGRITY360 LIMITED

    Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk.

  • boxxe Tenable One Exposure Management Platform

    BOXXE LIMITED

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support performance. It's comprised of: Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory

  • Anjuna Seaglass

    VINDO TECHNOLOGY LIMITED

    Anjuna Seaglass™ isolates workloads in a hardware-assisted environment that intrinsically secures data in every state to create a zero trust environment for code and data.

  • Orinoco 365: Automated Records Management and Governance tool in Microsoft 365

    INTELOGY LIMITED

    The easy way to manage records in Microsoft 365, Orinoco 365 automates the creation of SharePoint Sites, Microsoft Teams and Viva Engage Communities while applying your default retention labels and policies to them. Orinoco 365’s provisioning process allows you to take advantage of the rich retention capabilities in Microsoft Purview.

  • CheckPoint Harmony SaaS

    BYTES SOFTWARE SERVICES LIMITED

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact, and automates the mitigation of actual and potential risks to protect your company’s data. bssgc

  • CDW Crowdstrike Falcon Complete MDR

    CDW LIMITED

    Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.

  • Sophos Cloud Optix

    Chess CyberSecurity Ltd t/a CyberLab

    Sophos Cloud Optix, the Sophos Cloud Security Posture Management solution, proactively reduces business risk from unsanctioned activity, vulnerabilities, and misconfigurations across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform public cloud environments.

  • BeyondTrust Privileged Management

    BYTES SOFTWARE SERVICES LIMITED

    BeyondTrust Privileged Management stops attacks by removing excessive privileges on Windows, Mac, Unix, Linux and Network Devices. The solution empowers organizations to enforce least privilege by eliminating admin and root access. bssgc

  • Check Point CloudGuard Web Application Firewall (WAF) as a Service

    INTEGRITY360 LIMITED

    Check Point CloudGuard WAF provides Web Application and API protection. With contextual analysis, it eliminates the tradeoff between security and complexity of managing application security. Whether your application is in a data center or public/private cloud, CloudGuard's innovative, decision engine covers, OWASP top ten attacks, API attacks. blocks automated attacks(Bots)

  • SaaS - Software as a Service

    SYNAPSE CONSULTANTS LIMITED

    Azure - Dell APEX - Broadcom VMWare - Microsoft Dynamics 365 & Office 365. Druva

  • Palo Alto Prisma Access

    XPERTEX LTD

    Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.

  • Vulnerability Management

    TMC3 LIMITED

    tmc3 Vulnerability Assessment leverages Tenable's powerful suite of security tools to provide comprehensive vulnerability scanning and vulnerability management for your IT infrastructure. Designed to detect, prioritise, and remediate vulnerabilities, this vulnerability management service helps safeguard your networks, applications, and data from potential threats, ensuring compliance with industry standards and regulations.

  • iProov Physical Access Solution

    IPROOV LIMITED

    iProov Physical Access is a high-throughput, anti-spoofing access control solution that employs face, fingerprint, and palm biometrics. Designed to excel in real-world environments, the solution is compatible with non-specialised hardware. Trusted for accessing government facilities, securing public areas, and managing border crossings, it delivers robust protection, efficiency, and unmatched service.

  • boxxe Tenable Lumin

    BOXXE LIMITED

    Calculate, communicate and compare your cyber risk.

  • Box Content Cloud: A Secure Content Management Platform

    BOX.COM (UK) LTD

    Box is a platform that enables file management, collaboration and automated workflows internally and externally. Box comes with enterprise grade security and compliance and an intuitive user experience so not to slow processes down. With a robust API and 1400+ prebuilt integrations these capabilities can be extended into other applications.

  • CDW AvePoint Cloud Backup Salesforce

    CDW LIMITED

    Immutable, Air-Gapped Cloud to Cloud Backups for Microsoft 365, Dynamics 365, Microsoft Azure, Salesforce and Google Workspace

  • Ingentive Microsoft Cloud Security

    INGENTIVE LIMITED

    Ingentive offers structured solutions designed to help organisations familiarise themselves with Microsoft's Security suite. Harnessing advanced threat detection algorithms and real-time monitoring, Ingentive empowers organisations to detect and respond to cyber-threats swiftly. Gain comprehensive insights into your security posture and enhance your defence against emerging threats.

  • BeyondTrust Privileged Password Management

    BYTES SOFTWARE SERVICES LIMITED

    BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts. bssgc