Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1071 results found

1071 results found in Lot 2: Cloud software in the category Audit tools

  • Netwrix StealthINTERCEPT

    Bytes Software Services

    Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines. bssgc

  • Asset Management Applications

    Cloud Cover IT Limited

    The Flyte Asset Management App allows your organisation to keep a digital record of all physical devices, and the activity relating to each asset. This makes it easier to allocate resources, plan for projects, and ensures employees are held accountable for the condition of the devices that they use.

  • Auth0 (Okta)

    INTEGRITY360 LIMITED

    Auth0 Identity Platform is a cloud-based identity management service that helps organizations leveraging applications by providing a secure cloud-based identity platform to better understand, efficiently manage and intelligently engage their users. Auth0 provides an easy way to implement the most complex identity solutions across any technology stack or platform.

  • Computacenter - Proofpoint DLP Transform Package

    Computacenter (UK) Ltd

    Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behaviour. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.

  • Barrier Networks Crowdstrike Falcon for IT Automation

    Barrier Networks

    CrowdStrike Falcon® for IT, a module of the leading AI-native CrowdStrike Falcon® platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action.

  • Palo Alto Prisma Access

    Softcat Limited

    Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.

  • Purple Scribe: Secure, High-Accuracy Transcription and Summarisation for Audio and Video files

    Made Purple Ltd

    Purple Scribe is an ISO27001 certified transcription and summarisation solution that processes any audio or video file—including interviews, meetings, and recordings—with over 98% accuracy. It separates speakers, highlights uncertainties, integrates with existing systems , and outputs onto custom templates, saving thousands of man-hours for police, local-authorities, prisons and healthcare organisations.

  • Sophos Endpoint Security, Intercept X, XDR & MTR

    Southern Communications Corporate Solutions T/A SCG Corporate

    Sophos Intercept X is the world’s best endpoint protection, combining ransomware protection, deep learning malware detection, exploit prevention, EDR, and more in a single solution. Get complete protection for all your endpoints. Works across all your desktops, laptops, servers, tablets, and mobile devices. Works across all major operating systems.

  • Altia Covert Operations Solution (ACOS) Community Intelligence / Information in Confidence

    ABM Intelligence Limited

    ACOS offers the IIC module to record intelligence provided by public volunteers to identify opportunities for CHIS (Covert Human Intelligence Source) recruitment. A useful assessment tool that can be integrated with the ACOS Source Management module to ensure intelligence is always captured and recruitment opportunities are not missed.

  • Computacenter - CyberArk Endpoint Privilege Manager (EPM) SaaS

    Computacenter (UK) Ltd

    CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.

  • Trustmarque Palo Alto Cortex Xpanse

    Trustmarque Solutions Limited

    Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services. Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.

  • boxxe Cisco ThousandEyes

    BOXXE LIMITED

    ThousandEyes helps customers see all the networks and services, that create user experience in a single view, from synthetic transactions and service availability to network paths and global Internet routing feeds. Patented cross-correlation algorithms and interactive visuals to plan service rollouts, isolate problems and resolve issues faster.

  • Barrier Networks Crowdstrike Falcon Counter Adversary Operations

    Barrier Networks

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.

  • ECINS Client/Victim Engagement Module with MyPortal360 App

    Empowering Communities

    The Client/Victim Engagement Module is a unique communications platform that allows clients/victims to share information with you and you share in return. Designed around evidence based best practice. Use with clients, victims, vulnerable persons and students. Enhances wellbeing, electronic safety plans, social prescribing projects. Includes attendance tracker and mood diary

  • Cloud SaaS Products

    BASEEL PARTNERS LLP

    Baseel Partners LLP can offer various products in the areas of cyber security, IT governance, data protection, digital forensics, business processes and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS solution.

  • Micro Focus, now OpenText - Fortify on Demand (FoD) on SaaS

    MICRO FOCUS

    Fortify on Demand (FoD) is a remotely-delivered, cloud-based application security as a service solution. Application security testing is performed and reviewed by application security experts using application testing technologies and manual techniques. All customers are provided access to our technical account support team.

  • Netwrix StealthINTERCEPT

    Softcat Limited

    Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.

  • Arcus Corporate Governance

    Arcus Global Limited

    Arcus Corporate Governance aids teams managing complaints, freedom of information requests, personal data rights requests, MP and Member enquiries, and other corporate requests. It enables these requests to be logged, allocated, tracked, and aids in collation of answers and approvals. Online forms and publishing FOI responses is included.

  • Pathlock Cloud Application Access Governance (AAG)

    Resulting Ltd

    Pathlock Cloud AAG provides cross application Identity and Access Security Governance, Risk and Compliance (GRC) allowing you to monitor and cleanse system access and authorisations, detect and manage Segregation of Duties (SoD) violations, detect fraud, and automate joiner, mover, leaver processes and privileged (emergency) Access.

  • Cyber Vulnerability Research

    Leidos Innovations UK Limited

    The Vulnerability Research Service provides access to Leidos’ in-house Offensive Cyber Operations (OCO) Research and Development (IR&D) programme, operated globally. It is an innovative attack and exploitation capability designed to conduct exploit development, and technology research against defined target system, be they internal, or external.

  • Social Rx Connect

    promatica digital

    Social Rx is an end-to-end digital social prescribing solution for social prescribing teams to manage cases and get population-level insights with a range of dashboard and reports. The product is interoperable with the main GP IT systems.

  • Mimecast Awareness Training

    INTEGRITY360 LIMITED

    Mimecast Awareness Training is a security awareness training and cyber risk management platform that helps you combat information security breaches caused by employee mistakes.

  • MACS IBM Control Desk

    macseu

    MACS IBM Control Desk for cloud based management of IT assets (ITAM) and IT services (ITSM) according to ITIL standards and processes. Simplifying IT support needs for users and infrastructures, they reduce costs and increase user satisfaction through self-service, automated service management and integrated, best-practice based on an ITIL approach.

  • BlackBerry AtHoc Critical Communication & Event Management

    BlackBerry UK Limited

    BlackBerry® AtHoc is trusted by 2000+ organizations globally to unify their crisis communications. It offers a whole new level of protection for your people and gives leaders the information they need to make critical safety decisions.

  • Computacenter - Proofpoint CASB

    Computacenter (UK) Ltd

    Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition.

  • Structured Content Migration & Development Service

    Panlogic Limited - Digital Engineering

    Content strategy Current (as-is) content mapping (both online/offline) Defining new (to-be) processes Content matrix: map content & users Content generation: web-friendly content Content engine: resources, process & matrix Formats/structure/limits Create/Revise/Re-use Content relationships Meta-data Content migration/upload Migration tool Proofing/checking Content partner provision

  • MetaLearning Premium

    MetaCompliance Ltd

    MetaLearning Premium combines creativity, expert knowledge and innovative software to deliver effective and engaging cyber security awareness eLearning content that helps businesses stay secure and compliant. Using stories, realistic scenarios and narratives for context, MetaLearning Premium provides animated and lifelike eLearning courses.

  • Falcon Endpoint Detection & Response (EDR)

    Computacenter (UK) Ltd

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • AvePoint Policies for Microsoft 365

    Bytes Software Services

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive. bssgc

  • ThoughtSpot

    Billigence

    ThoughtSpot is a business intelligence platform that provides a search based business analytics for non-technical users with wide data connectivity, preparation, interactive analytics, natural language search, visualization, collaboration, security, and scalable performance, with deployment options ranging from on-premises to cloud. ThoughtSpot can provide you with