Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1557 results found

1557 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Computacenter - Proofpoint Advanced Package

    Computacenter (UK) Ltd

    Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.

  • Palo Alto Cortex XSIAM

    Xpertex

    Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents.

  • Sophos Zero Trust Network Access (ZTNA)

    Bytes Software Services

    "Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users. bssgc

  • RDocs: Document Security

    RPOST UK LIMITED

    RDocs™ is the most innovative solution for secure document sharing, offering advanced monitoring and remote-control features. Track who reads your documents, including where, when, and how often. Restrict access by geolocation, IP address, or domain, and protect against unauthorized sharing with steganographic technology. Share securely without centralized storage risks.

  • Distributed Denial of Service (DDoS)

    Sapphire

    DDOS protection automatically prevents scalable attacks including HTTP/S Floods, DNS, and more. We defend organisations against today’s most advanced DDoS attacks using advanced behavioural based detection for both network layer (L3/4) and application-layer (L7) attacks, automatic real-time signature creation to protect against zero-day attacks,

  • SYNERGi GRC

    CAPGEMINI UK PLC

    Capgemini’s SYNERGi Platform provides a cost effective and comprehensive Governance Risk and Compliance software solution for rationalising IT GRC processes, managing cyber risk, and meeting regulatory requirements. SYNERGi enables companies to implement a framework to rigorously measure, mitigate, and monitor risk. It simplifies and reduces the cost whilst improving visibility.

  • Key Management Solution

    GET SWARMS LIMITED

    Safeguard Your Data with Get Swarm's Key Management Solution, designed to safeguard sensitive data and streamline access control. Our service ensures the secure storage, encryption, and centralized management of cryptographic keys.Able to manage individual and group key sessions with policy enforcement. Supports existing encryption algorithms to layer into existing network.

  • Sophos Managed Detection and Response Complete (MDR) Server

    CHESS ICT LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Ultima AvePoint Cloud Governance for Office 365

    Ultima Business Solutions Ltd

    Automate the provisioning, management and lifecycle of content in Office 365 with user-self-service. Manage permissions with scheduled re-certification and dispose of content when no longer needed.

  • Minor Age Estimation Service

    Rigr AI

    We've built an accurate AI model for Facial Age Estimation trained on a proprietary dataset. This system accurately determines the age of minors from images and is designed for law enforcement, immigration, and trust and safety measures to protect children both online and offline.

  • Mimecast DMARC Analyzer

    INTEGRITY360 LIMITED

    Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC compliance.

  • Check Point Harmony Browse

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.

  • Broadcom/Symantec Email Threat Isolation (ETI)

    Gradian Systems Ltd

    Symantec Email Threat Isolation stops advanced email attacks by insulating users from spear phishing, credential theft, and ransomware attacks by isolating malicious links and downloads. It stops credential theft by rendering webpages in read-only mode by virtualizing browsers in a highly-scalable and secure, disposable container, creating a secure execution environment.

  • Amazon AppStream 2.0 Solution

    IMPERF CONSULTING LIMITED

    Amazon AppStream 2.0 lets you move your desktop applications to AWS, without rewriting them. It’s easy to install your applications on AppStream 2.0, set launch configurations, and make your applications available to users.

  • Computacenter - CrowdStrike Falcon Exposure Management

    Computacenter (UK) Ltd

    CrowdStrike Falcon® Exposure Management is a powerful ground breaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Barrier Networks Centri for Cisco Security Service Edge (SSE)

    Barrier Networks

    Managed Security Service Edge from Barrier helps organizations provide secure connectivity for hybrid workforces, protecting corporate resources from cyberattacks and data-loss. Cisco Powered Service.

  • CDW AvePoint Cloud Governance for Microsoft 365

    CDW LIMITED

    M365 is an essential productivity solution millions of people use every day. With that use comes significant challenges in how you can scale your management and security of the platform. Implement an extensible governance framework that empowers users, is easy to maintain, and scales with your organization.

  • Proofpoint Core Plus Package

    Softcat Limited

    Proofpoint's Core Plus package adds Email Fraud Defence, Secure Email Relay, and Supplier Threat Protection to the Core package offerings.

  • Check Point CloudGuard Network Security (CGNS)

    Softcat Limited

    CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.

  • Splunk Threat Detection Investigation and Response Suite

    Bytes Software Services

    Use any or all of Splunk’s Security products and services together to provide a unified security operations solution. On top of Splunk Enterprise or Splunk Cloud, combine Enterprise Security (SIEM), Mission Control, Splunk Attack Analyser (SAA), Splunk Threat Intelligence Management (TIM), Splunk SOAR, and Splunk UBA. bssgc

  • Logit.io Metrics as a Service and Observability

    Logit.io

    The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • CrowdStrike Falcon Endpoint Detection & Response (EDR)

    INTEGRITY360 LIMITED

    Falcon EDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • MTI Quest

    MTI Technology Ltd

    Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard.

  • CDW Cisco Full Stack Observability (FSO)

    CDW LIMITED

    Full-Stack Observability by Cisco moves beyond domain monitoring into full-stack visibility, insights, and actions, transforming siloed data into actionable insights that provide shared context for your IT teams, giving you the power to prioritise your actions so you can deliver flawless customer experiences that drive revenue while accelerating digital transformation.

  • Qualys Cloud Platform (QCP)

    INTEGRITY360 LIMITED

    Qualys Cloud Platform consists of a suite of IT security and compliance solutions delivered via SaaS deployment model that leverages shared and extensible core services. The solution allows customers to continuously monitor their hybrid environments for Vulnerabilities, compliance, misconfigurations, automate remediation with the aim of reducing organisational risk.

  • Sophos Zero Trust Network Access (ZTNA)

    CHESS ICT LIMITED

    Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users.

  • Micro Focus, now OpenText - ArcSight with Real-Time Threat Detection on SaaS

    MICRO FOCUS

    ArcSight SIEM-as-a-Service with Real-Time Threat Detection (Detect) is a real-time correlation and threat alerting system that increases SOC analyst awareness of critical security incidents in their environment. Detect enables SOC analysts to create correlation rules that generate alerts when specific conditions occur within their event logs.

  • Tenable Attack Surface Management (formerly Tenable.asm)

    INTEGRITY360 LIMITED

    Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk.

  • boxxe Tenable One Exposure Management Platform

    BOXXE LIMITED

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support performance. It's comprised of: Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory

  • Anjuna Seaglass

    VINDO TECHNOLOGY LIMITED

    Anjuna Seaglass™ isolates workloads in a hardware-assisted environment that intrinsically secures data in every state to create a zero trust environment for code and data.