Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1734 results found

1734 results found in Lot 2: Cloud software in the category Security risk management

  • SecurEnvoy MFA / Identity Access from Chess Cyber Security

    ARMADILLO SEC LTD

    SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.

  • Computacenter - CheckPoint Cloud Native Application Protection Platform (CNAPP)

    Computacenter (UK) Ltd

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.

  • IEX ESG

    EcoOnline

    Our ESG solution enable organisations to build one true view of their ESG performance, across the three pillars of a responsible business. The suite of modules aggregate data into one platform to create greater transparency, improve internal benchmarking and leverage actionable insights to cascade policies and procedures throughout operations.

  • Contracts Management Platform

    OFFICELABS LIMITED

    The OfficeLabs Contract Management Platform maximises the integration capabilities of the Microsoft Power Platform using Power Apps, Power Automate, SharePoint along with Azure. The platform allows multiple users access and guidance through the Contract Process with an easy-to-use contract form while maintaining the built-in security of Microsoft 365.

  • CyberForceHQ.com - Cyber security skills assessment, recruitment & upskilling platform. .

    Lloyds Ventures

    CyberForceHQ.com: Skills speak louder than words. CyberForce utilizes a science-backed methodology in cyber security skill assessment, developing and validating its tests with input from cyber security experts. These assessments are constructed around established cyber security skill frameworks and have been independently verified for predictive accuracy.

  • EverFox Zero Trust Content Disarm and Reconstruction (ZTCDR)

    SOFTCAT PLC

    ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.

  • View360Global. Immersive & Experiential Learning Platform (Multilingual)

    COGNITAS GLOBAL LIMITED

    View360global is a multilingual training platform using mixed reality to create immersive learning environments for in person or online delivery of facilitated training and exercising across all sectors. Scenarios can be customised to deliver unique training based on organisational and operational needs. Its also widely used for crisis management exercising

  • Meterian Application Security Platform

    METERIAN LTD

    Meterian security suite for enterprise applications continuously protects against vulnerabilities in open source components, stability and licensing risks, while validating the underlying digital infrastructure. Thanks to its unique ingestion algorithms, Meterian ensures unparalleled coverage and precision.

  • Mobile Application Development

    JBi Digital

    JBi Digital has years of experience designing and developing both online and offline mobile applications. JBI’s user-focused (UX) applications are built securely using industry best practices. The result is an intuitive, engaging and seamless mobile app that supports your goals and caters to your users’ specific needs.

  • CyberArk Workforce Identity

    PHOENIX SOFTWARE LIMITED

    CyberArk workforce Identity is an IDaaS that offers full featured identity lifecycle & access management; it includes adaptive MFA/SSO and unique extra controls such as a Password Manager, adaptive Workstation MFA, Secure Browser and Web session protection

  • BlueVoyant - Digital Risk Protection (DRP)

    SOMERFORD ASSOCIATES LIMITED

    Digital Risk Protection, detects and eliminates cyber threats before impact. Continuously monitoring, threat data sources, proprietary global DNS data sets, private cybercriminal instant messaging channels. Identify and validates threats, providing actionable countermeasures. Always accessible to add context and facilitate takedown phishing sites, domain lookalikes, social media impersonations, fraudulent apps.

  • F5 Distributed Cloud

    CYBIT LIMITED

    F5 Distributed Cloud Services are SaaS-based security, networking, and application management services that enable customers to deploy, secure, and operate their applications in a cloud-native environment wherever needed–data center, multi-cloud, or the network or enterprise edge.

  • Check Point Harmony Endpoint

    INTEGRITY360 LIMITED

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Check Point Infinity Playblocks

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Check Point Playblocks is a modern cyber security training and simulation platform designed to enhance the security skills of IT teams. This innovative tool leverages gamification to create engaging and realistic cyber threat scenarios, helping teams to practice and improve their response strategies in a controlled environment.

  • CrowdStrike Falcon Data Protection

    SOFTCAT PLC

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • Tufin Enterprise

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Tufin Enterprise elevates your network security program to a highly evolved state, in which, network and cloud security processes are integrated, policy is managed and implemented via zero-touch automation, and everything is administered via a central control plane that delivers unmatched scalability and extensibility

  • Cloud SIEM as a Service

    VIEWDECK ENGINEERING LIMITED

    Secure Open Source Security platform, providing agent/syslog based Endpoint Security, Threat Intelligence, Security Operations and Cloud Security as a Service. Deploy to Secure Public, Sovereign and Private cloud environments. Unified XDR and SIEM protection for endpoints and cloud workloads. Consolidate your logs, events and compliance into one place.

  • Power Platform Assessment, Governance CoE and App Development

    HSO ENTERPRISE SOLUTIONS LIMITED

    HSO's Power Platform Assessment reviews your maturity in governance, security and platform management, alongside envisioning of use cases for development, building a road map around priority, complexity, business goals and value. We then build out your bespoke, governed infrastructure, and validate by developing a high-priority solution, delivering immediate value.

  • Attack Surface Monitoring

    Red Sift Ltd

    Continuous automated discovery of Internet and Cloud assets, with comprehensive monitoring and coverage of network and security standards. Special focus on subdomain takeover protection. Covered standards include WHOIS/RDAP, DNS, DNSSEC, SMTP, SPF, DMARC, MTA-STS, SSL, TLS, PKI, HTTP, web application security, CSP, HSTS, CAA, security headers, technologies.

  • AvePoint Policies for Microsoft 365

    SOFTCAT PLC

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.

  • Proofpoint Enterprise Data Loss Prevention

    BYTES SOFTWARE SERVICES LIMITED

    Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action. bssgc

  • GoAnywhere MFTaaS (Fortra) - from HANDD (MFT)

    HANDD Business Solutions

    GoAnywhere MFTaaS (Managed File Transfer as a Service) is a cloud-based solution for secure file transfers. It offers encryption, automation, and centralised management, enabling businesses to securely exchange data across systems, partners, and platforms. It simplifies file transfer processes while ensuring compliance with data security regulations.

  • Cyber Security Training and Awareness

    AVELLA SECURITY LIMITED

    BLOCKPHISH delivers cloud-based Cyber Security Training and Awareness to help reduce the risk of a cyber attack on your business. As phishing and socially engineered attacks rely on exploiting human vulnerabilities, improving user behaviour is essential. Our cloud platform delivers learning in multiple formats to ensure the most effective results.

  • Claroty xDome

    INTEGRITY360 LIMITED

    Claroty xDome spans the entire cybersecurity journey, empowering organisations with comprehensive OT (operational techncology)/ICS (Industrial Control Systems) asset visibility, identifying, measuring, prioritising risk, deploying Zero Trust-based protective controls, to optimising threat-detection through a vast network of integrations. xDome is a modular, SaaS platform that makes XIoT cybersecurity decision clear through:

  • Experian Tracing Solutions for Police and Law Enforcement with Investigator Online

    Experian

    Investigator Online is a secure web service product to enable the Police and Law Enforcement agencies to investigate crime

  • Microsoft 365 Email Security (via Mimecast)

    Atlas Cloud Ltd

    Microsoft 365 is widely used, but its standard email security may not be enough. Mimecast offers layered protection that complements Microsoft’s defences. It stops threats without hindering collaboration, keeps archives compliant, and empowers end-users. Think of it as adding an extra lock to your digital door.

  • Managed Detection and Response (MDR)

    CYMBALSTREAM SOLUTIONS LIMITED

    Cymbalstream, in partnership with Arctic Wolf, offers 24/7 monitoring and response to detect, investigate, and mitigate cyber threats across networks, endpoints, and cloud environments. Leveraging Arctic Wolf's security technologies, threat intelligence, and human expertise, Cymbalstream proactively hunts for threats and responds to incidents across an organisation's IT infrastructure.

  • Tenable Vulnerability Management

    BYTES SOFTWARE SERVICES LIMITED

    Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud. bssgc

  • Forcepoint Data Guard (FDG)

    Gradian Systems Ltd

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • RSign: eSignatures Made Easy

    RPOST UK LIMITED

    RSign® is the award-winning eSign and eForms feature-rich and affordable solution by RPost®. Recognized by IDC MarketScape and Aragon Research, RSign ensures compliance, security, and convenience. It integrates seamlessly with platforms like Outlook and Salesforce. Streamline workflows, reduce eSignature costs, and improve customer service. Choose RSign - just switch it!