Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Rapid7 Insight VM

    INTEGRITY360 LIMITED

    InsightVM provides a scalable, efficient way to collect your vulnerability data, turn it into answers, and minimize risk. InsightVM leverages the latest analytics and endpoint technology to discover vulnerabilities in real-time, pinpoint their location, prioritize them for your business, facilitate collaboration with other teams, and confirm exposure has been reduced.

  • Check Point CloudGuard Network Security - For Azure Virtual WAN

    INTEGRITY360 LIMITED

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.

  • PCL Legacy Application Data Archiving Solution

    PAYROLLCLOUD LIMITED

    The Legacy Application Data Archiving Solution facilitates decommissioning E-Business Suite (EBS) legacy systems, leading to significant reductions in hardware, software, storage, and maintenance expenses. This is achieved by archiving application data to Oracle Cloud Infrastructure (OCI) through the Autonomous Database and implementing a user-friendly front-end interface.

  • Armour Cloud

    ARMOUR COMMUNICATIONS LIMITED

    UK company providing NCSC CPA certified out of band secure mobile communications. iOS and Android smartphones and tablets, Windows desktops. Cost-effective, easy to use solution for governments. Secure voice, video, instant messaging, group chat, file transfer, cross-domain, interoperability, fully auditable. Cloud-based or on-premises deployments UK OFFICIAL SENSITIVE, Advanced Mobile, SECRET.

  • Luciditi Digital Identity Credentials

    ARISSIAN LTD

    Provide customers with confidence that your employees are who they claim to be and the role they perform. Luciditi Digital Credentials - provides secure digital identity cards that can be checked by eye and validated electronically in real time to provide the latest in ID verification.

  • IBM Data Enrichment, Cataloguing, Management and Governance Services

    IBM UNITED KINGDOM LIMITED

    The IBM Data Cataloguing, Governance, Management, and Enrichment Service enables you to introduce proven state-of-the-art data services to underpin your digital strategy; with a range of supporting services to help you optimise data assets. We enable enterprise-scale data operations, safely, using proven services in a secure, evergreen service delivery model.

  • Barrier Networks Crowdstrike Falcon Insight Extended Detection & Response (XDR)

    BARRIER NETWORKS LIMITED

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Progress MOVEit Cloud - From HANDD Business Solutions (MFT - Managed File Transfer)

    HANDD BUSINESS SOLUTIONS LIMITED

    MOVEit Cloud is a secure, cloud-based managed file transfer service by Progress Software. It facilitates safe data exchange, ensuring compliance with regulations. Offering encryption, advanced authentication, and centralised management, it streamlines file transfer with heightened security and scalability. UK hosting is available.

  • Tenable One - Standard

    INTEGRITY360 LIMITED

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent attacks and communicate cyber risk to support optimal business performance. Tenable One Standard is comprised of: Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin &Exposure View &Asset Inventory

  • Keycloak

    MILLERSOFT LIMITED

    Keycloak is an open-source identity and access management solution. It provides authentication, authorization, and single sign-on capabilities for web and mobile applications. Keycloak allows centralized user management, role-based access control, and integration with various authentication protocols like OAuth 2.0 and OpenID Connect and SAML.

  • Sophos Managed Detection and Response Complete (MDR) Server

    PHOENIX SOFTWARE LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Barracuda Email Protection Premium Plus

    MISCO TECHNOLOGIES LIMITED

    Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks while also giving ability to protect data from accidental deletion and compliance

  • Delinea Platform - Privileged & Identity Access Management (PIM & PAM)

    INTEGRITY360 LIMITED

    Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.

  • Mimecast Awareness Training

    CHESS ICT LIMITED

    Mimecast Awareness Training is a security awareness training and cyber risk management platform that helps you combat information security breaches caused by employee mistakes.

  • MTI Rubrik- Zero Trust Ref Architecture to NCSC 3-2-1 guidelines

    MTI TECHNOLOGY LIMITED

    Rubrik provides a zero-trust data protection platform across all data and applications whether it be located on-premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery , Incident containment and Orchestrated Application Recovery all within a single management plane.

  • BoxPhish - Security Awareness Training & Simulated Phishing

    Security Software Solutions Ltd (S3 Ltd)

    Boxphish provide interactive training courses and real-world phishing simulations to educate and protect our users

  • Mimecast Brand Exploit Protect

    Chess CyberSecurity Ltd t/a CyberLab

    Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.

  • CDW Check Point Harmony Mobile

    CDW LIMITED

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • Computacenter - ProofPoint Tessian ICES

    COMPUTACENTER (UK) LIMITED

    Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • Cloud Penetration Testing Services

    SALUS DIGITAL SECURITY LIMITED

    Assurance testing of cloud services against HMG approved standards and/or industry best practice.

  • Progress Kemp LoadMaster

    SOFTCAT PLC

    Kemp LoadMaster By Progress provides geographical, cloud and application load balancing with integrated WAF, Reverse proxy, Kubernetes Ingress Controller and Network Telemetry

  • Proofpoint Spotlight

    SOFTCAT PLC

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Cloudflare Zero Trust Network Access (ZTNA)

    INTEGRITY360 LIMITED

    Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.

  • LogPoint SIEM

    Chess CyberSecurity Ltd t/a CyberLab

    LogPoint's modern Security Incident and Event Management (SIEM) solution provides monitoring, detection, and alerting of security events or incidents within an IT environment. It provides a comprehensive and centralised view of the security posture of an IT infrastructure and enables enterprise security professionals to view activities within their environment.

  • Ultima AvePoint Policies and Insights for Microsoft 365

    ULTIMA BUSINESS SOLUTIONS LTD.

    Reduce the administration overhead associated with Office 365 by centrally managing configuration tasks and permissions. Address issues in bulk such as policy violations. Ensure content is available to the right users when it is needed.

  • PLM - 3DEXPERIENCE PLATFORM

    DASSAULT SYSTEMES UK LIMITED

    DS provides Software as a Service for Product Life cycle Management for 11 industries covering Governance, Engineering, Manufacturing, Data Science for an entire organization in order to create digital twins in a virtual world.

  • Forescout NetSec Automation & Control Bundle

    CHESS ICT LIMITED

    Network Security Automation & Control delivers real-time and continuous visibility across all asset types and enables secure and compliant connectivity between all asset types within the network. Organizations can automate compliance and policy control and enable quick incident recovery while integrating and automating workflows for improved cybersecurity response.

  • Fortra Data Classification Suite DCS (Formerly Titus) - From HANDD Business Solutions

    HANDD BUSINESS SOLUTIONS LIMITED

    Fortra Data Classification Suite (Formerly Titus) allows you to organise and label data according to its sensitivity and importance. Protect sensitive information by assigning rich content labels and persistent metadata. Fortra DCS aids enforcement of data security policies and ensures compliance with regulations of data on-premise and in the cloud.

  • ULTRA Remote Browser Isolation (RBI)

    Garrison Technology Ltd

    Garrison ULTRA is a highly performant, full browser isolation cloud service. Garrison ULTRA leverages Garrison’s unique hardware enforced browser isolation technology, trusted by governments around the world, enabling users to safely visit ‘risky’ websites and providing a scalable service that protects from all web-based attacks, including phishing and malware threats.

  • CrowdStrike Falcon Complete MDR

    SOFTCAT PLC

    Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.