Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1552 results found

1552 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Insight - Quest On Demand

    INSIGHT DIRECT (UK) LTD

    Quest On-Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard.

  • Threat Intelligence - Recorded Future

    RAZOR THORN SECURITY LTD

    Recorded Future is the most comprehensive and independent threat intelligence cloud platform. We enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.

  • Infrastructure Pen Testing

    I-NET SOFTWARE SOLUTIONS LTD

    Our team provide dependable penetration testing for internal and internet facing environments, ensuring protection from cyber threats. Using CREST and CHECK ITHC accredited methodologies we perform state of the art automated vulnerability scanning, and carefully targeted manual testing to deliver an outstanding assessment encompassing internal and external estates.

  • Sophos Central Intercept X for Mobile

    CHESS ICT LIMITED

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • CyberArk PAM Self-Hosted

    INTEGRITY360 LIMITED

    CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics.

  • Security Log Management Service (SIEMaaS) as a service

    Proact IT UK Limited

    Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support. The service provides remote collection and analysis of logs, using a leading public cloud hosted Security Information and Event Management solution

  • Computacenter - F5 Distributed Cloud Bot Defense (formerly Silverline Shape Defence)

    Computacenter (UK) Ltd

    A managed security service that protects your web applications from automated bot attacks to prevent large-scale fraud, inflated operational costs, and friction for your end users.

  • Verasity Cyber Security

    Gaiasoft International Limited

    Tailored security solutions to meet your unique needs. Our team of cyber security experts are always up-to-date with the latest threats and solutions.

  • Quest On Demand

    SOFTCAT PLC

    Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and O365 workloads across all tenants from a single dashboard.

  • Falcon Identity Threat Detection & Protection

    PHOENIX SOFTWARE LIMITED

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • Sophos Cloud Optix

    SOFTCAT PLC

    Sophos Cloud Optix, the Sophos Cloud Security Posture Management solution, proactively reduces business risk from unsanctioned activity, vulnerabilities, and misconfigurations across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform public cloud environments.

  • Sophos Managed Detection and Response Complete (MDR) Server

    BYTES SOFTWARE SERVICES LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications. bssgc

  • Rapid7 Insight VM

    INTEGRITY360 LIMITED

    InsightVM provides a scalable, efficient way to collect your vulnerability data, turn it into answers, and minimize risk. InsightVM leverages the latest analytics and endpoint technology to discover vulnerabilities in real-time, pinpoint their location, prioritize them for your business, facilitate collaboration with other teams, and confirm exposure has been reduced.

  • Check Point CloudGuard Network Security - For Azure Virtual WAN

    INTEGRITY360 LIMITED

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.

  • PCL Legacy Application Data Archiving Solution

    PAYROLLCLOUD LIMITED

    The Legacy Application Data Archiving Solution facilitates decommissioning E-Business Suite (EBS) legacy systems, leading to significant reductions in hardware, software, storage, and maintenance expenses. This is achieved by archiving application data to Oracle Cloud Infrastructure (OCI) through the Autonomous Database and implementing a user-friendly front-end interface.

  • Armour Cloud

    Armour Comms

    UK company providing NCSC CPA certified out of band secure mobile communications. iOS and Android smartphones and tablets, Windows desktops. Cost-effective, easy to use solution for governments. Secure voice, video, instant messaging, group chat, file transfer, cross-domain, interoperability, fully auditable. Cloud-based or on-premises deployments UK OFFICIAL SENSITIVE, Advanced Mobile, SECRET.

  • Luciditi Digital Identity Credentials

    ARISSIAN LTD

    Provide customers with confidence that your employees are who they claim to be and the role they perform. Luciditi Digital Credentials - provides secure digital identity cards that can be checked by eye and validated electronically in real time to provide the latest in ID verification.

  • IBM Data Enrichment, Cataloguing, Management and Governance Services

    IBM UNITED KINGDOM LIMITED

    The IBM Data Cataloguing, Governance, Management, and Enrichment Service enables you to introduce proven state-of-the-art data services to underpin your digital strategy; with a range of supporting services to help you optimise data assets. We enable enterprise-scale data operations, safely, using proven services in a secure, evergreen service delivery model.

  • Barrier Networks Crowdstrike Falcon Insight Extended Detection & Response (XDR)

    Barrier Networks

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Progress MOVEit Cloud - From HANDD Business Solutions (MFT - Managed File Transfer)

    HANDD Business Solutions

    MOVEit Cloud is a secure, cloud-based managed file transfer service by Progress Software. It facilitates safe data exchange, ensuring compliance with regulations. Offering encryption, advanced authentication, and centralised management, it streamlines file transfer with heightened security and scalability. UK hosting is available.

  • Tenable One - Standard

    INTEGRITY360 LIMITED

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent attacks and communicate cyber risk to support optimal business performance. Tenable One Standard is comprised of: Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin &Exposure View &Asset Inventory

  • Keycloak

    MILLERSOFT LIMITED

    Keycloak is an open-source identity and access management solution. It provides authentication, authorization, and single sign-on capabilities for web and mobile applications. Keycloak allows centralized user management, role-based access control, and integration with various authentication protocols like OAuth 2.0 and OpenID Connect and SAML.

  • Sophos Managed Detection and Response Complete (MDR) Server

    PHOENIX SOFTWARE LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Barracuda Email Protection Premium Plus

    MISCO TECHNOLOGIES LIMITED

    Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks while also giving ability to protect data from accidental deletion and compliance

  • Delinea Platform - Privileged & Identity Access Management (PIM & PAM)

    INTEGRITY360 LIMITED

    Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.

  • Mimecast Awareness Training

    CHESS ICT LIMITED

    Mimecast Awareness Training is a security awareness training and cyber risk management platform that helps you combat information security breaches caused by employee mistakes.

  • MTI Rubrik- Zero Trust Ref Architecture to NCSC 3-2-1 guidelines

    MTI TECHNOLOGY LIMITED

    Rubrik provides a zero-trust data protection platform across all data and applications whether it be located on-premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery , Incident containment and Orchestrated Application Recovery all within a single management plane.

  • BoxPhish - Security Awareness Training & Simulated Phishing

    S3 Ltd

    Boxphish provide interactive training courses and real-world phishing simulations to educate and protect our users

  • Mimecast Brand Exploit Protect

    Cyberlab

    Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.

  • CDW Check Point Harmony Mobile

    CDW LIMITED

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.