Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2446 results found

2446 results found in Lot 2: Cloud software in the category Security

  • Vectra Cognito Recall

    INTEGRITY360 LIMITED

    Cognito Recall from Vectra is a cloud service, provided by Vectra, which stores network metadata in support of security investigation and threat hunting. Cognito Recall stores metadata that is extracted by network sensors and makes it available to analysts to help them hunt for threats.

  • Google Cloud Disaster Recovery and Business Continuity

    LEFKE IT LIMITED

    LefkeIT excels in Google Cloud Disaster Recovery and Business Continuity, ensuring resilience and continuity for your critical operations. Our expert consultants design and implement robust disaster recovery strategies leveraging Google Cloud's advanced capabilities.

  • Jodami: Secure video, voice and chat

    SUREVINE LIMITED

    Jodami is a secure video conferencing, voice and instant messaging solution. It provides a cohesive user experience and effective security controls. It is designed to scale appropriately to the needs of any organisation. It can be hosted anywhere, allowing you to take back control of your organisation’s communications.

  • CDW Mimecast Cybergraph

    CDW LIMITED

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • Windows Server 2012/R2 Extended Security Updates

    NAK Consulting Services Ltd

    Extended Security Updates for Windows Server 2012/R2

  • Time and Motion software to monitor company resources efficiency

    ADAPPT LIMITED

    Providing everything you need to help optimise your remote employees time efficiency, increases the overall productivity of your organisation, via non-intrusive, GDPR compliant software which collates circa 50,000 data points per user/day to extrapolate the causes of bottlenecks, help to forecast resourcing requirements, and mitigate against bad practice.

  • Check Point CloudGuard Web Application Firewall (WAF) As a Service

    CHARTERHOUSE VOICE & DATA LIMITED

    Web Application and API protection. With deep application contextual analysis. Eliminates tradeoff between level of security and the complexity of managing application security. Whether applications are hosted in a data center or a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks and blocks automated attacks.

  • Google Chronicle SecOps

    SEP2 LIMITED

    Chronicle SecOps (SIEM & SOAR) , powered by Google infrastructure, enables cost-effective use of security telemetry to improve SOC productivity and combat modern threats.

  • Intelligent Document Understanding - UiPath

    VE3 GLOBAL LTD

    Our certified Consultants offer top-notch Automation Solutions utilizing cutting-edge technologies including AI (Artificial Intelligence), Low-Code BPM (Business Process Management), Process/Task Mining, OCR (Optical Character Recognition), ODM (Operational Decision Management), and Virtual Assistants/Chatbots. We have partnerships with industry-leading companies like ABBYY, AutomationHero, Bizagi, Camunda, Celonis, IBM, Soroco, and UiPath.

  • Forescout NetSec Core

    Chess CyberSecurity Ltd t/a CyberLab

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assests.

  • WithSecure EPP & EDR

    IOCO SOLUTIONS LIMITED

    WithSecure™ Elements is the unified cloud-based cyber security platform designed to reduce risk, complexity, and inefficiency. WithSecure™ Elements combines powerful predictive, preventive, and responsive security capabilities – all managed and monitored through a single security center.

  • Knowbe4 Cyber Security Awareness Training

    Glemnet Ltd

    Your employees are frequently exposed to sophisticated social engineering attacks. It is time for a comprehensive approach to effectively manage this problem, managed by people with a technical background. The world's largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters.

  • Cyber Security

    CYMBALSTREAM SOLUTIONS LIMITED

    Cymbalstream offers a range of security solutions, including Managed Detection and Response (MDR), Cloud Detection and Response (CDR), and other advanced cybersecurity services. Cymbalstream leverages Arctic Wolf's technologies, threat intelligence, and expert security analysts to deliver 24/7 monitoring, detection, and response across an organisation's IT infrastructure.

  • Google Cloud Application Modernization Services

    DEFENCE DATASEC LTD

    Defence DataSec offers top-tier Google Cloud Application Modernization Services, revamping legacy systems for enhanced performance, scalability,and agility.Our expert team leverages Google Cloud's cutting-edge technologies to modernize applications,containerize workloads, and streamline deployment processes.Trust us to accelerate your digital transformation journey,empowering your organization with modernized applications that drive innovation and competitive advantage.

  • Rapid7 Insight ThreatCommand

    INTEGRITY360 LIMITED

    Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you to make informed decisions and rapidly respond to protect your business.

  • CDW Palo Alto Cortex XDR

    CDW LIMITED

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency.

  • SotaPROTECT Suite

    SOTA SOLUTIONS LIMITED

    SotaPROTECT Suite provide managed anti-virus, email security gateway, web security gateway, Multi-Factor Authentication and cyber security awareness training for staff. This provides an essential level of protection against cyber bad actors.

  • Cyber security risk assessment & planning

    I-NET SOFTWARE SOLUTIONS LTD

    A Digital Service Management (DSM) enabler,this service provides an assessment of your Cyber Security practices.Focused on capabilities associated with technology services and environment to: strengthen cybersecurity capabilities, enable effective and consistent evaluation and benchmark of cybersecurity capabilities. We enable prioritisation of actions and investments to improve security. unstructured big data.

  • Globalscape EFT Arcus (Fortra) - From HANDD Business Solutions (MFT)

    HANDD BUSINESS SOLUTIONS LIMITED

    Globalscape EFT Arcus is a cloud-native, managed file transfer solution designed for scalability and security. It offers flexible deployment options, automated workflows, and advanced encryption for secure data transfer. Arcus simplifies file sharing across organisations while ensuring compliance with regulations and industry standards.

  • Pathlock Cloud Continuous Controls Monitoring (CCM) for SAP

    RESULTING LIMITED

    Pathlock Cloud CCM offers a comprehensive toolkit to enhance risk identification and assessment, reduce manual compliance controls efforts, and improve operational excellence. With this solution, organisations can streamline their process controls and mitigate risks more efficiently, enhancing their overall performance and success.

  • Stone Managed Internet Security Service - Cisco Umbrella

    Stone Technologies Limited Trading as Converge Technology Solutions

    Stone utilises Cisco Umbrella to deliver the most secure, reliable, and fastest internet experience to more than 100million users daily. Umbrella unifies firewall, secure web gateway, DNS-layer security, cloud access security broker (CASB), and threat intelligence solutions into a single platform to help businesses of all sizes secure their network.

  • CDW Check Point CloudGuard Cloud Security Posture Management (CSPM)

    CDW LIMITED

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.

  • CDW Sophos Network Detection and Response (NDR)

    CDW LIMITED

    "Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • Cisco Meraki Networking by ITGL

    CONSCIA GROUP UK LTD

    Services to cover all Cisco Meraki Software including Switches, Access Points, Firewalls, SD-WAN, IoT sensors, Cameras, Cellular gateways and Secure Access Services Edge (SASE). The Meraki dashboard is a key enabler of this service.

  • Gimmal Link Enterprise

    OFFICELABS LIMITED

    Gimmal Link stores SAP content and data within Microsoft SharePoint and Microsoft 365 while leaving the SAP environment and the SAP end user’s view unchanged. This integration allows users inside and outside of SAP to collaborate and work on the same document-centric business processes while reducing total cost of ownership.

  • Google Workspace Enterprise Essentials

    LEVETT CONSULTANCY LIMITED

    Essentials editions are designed to integrate seamlessly with your existing email solution, providing your organisation with collaboration tools, video conferencing, and enterprise-grade security. All Essentials editions offer seamless integration with your existing solutions, creating a productive hybrid environment for your end-users.

  • De-installation / Decommissioning Telecoms and ICT

    NETWORK 2 SUPPLIES LIMITED

    N2S are specialists in large scale multi-site De-installations and decommissioning of IT equipment including desktops, screens, unified comms/telephony and managed print. Utilise a fleet of tracked vehicles to return equipment to headquarters for WEEE recycling or resale.

  • Managed Security Logging as a service

    PROACT IT UK LIMITED

    Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support.

  • SAP HANA Services

    LEFKE IT LIMITED

    At LefkeIT, our SAP HANA Services are designed to empower Government Departments with advanced analytics, real-time insights, and enhanced performance. We specialize in implementing, optimizing, and managing SAP HANA environments, unlocking the full potential of in-memory computing for your organization.

  • Rapid7 InsightVM Continuous Vulnerability Assessment

    ITHQ LTD

    InsightVM provides highly available, scalable & efficient vulnerability assessments and risk scoring. InsightVM discovers vulnerabilities in real-time and prioritises them for your team with executive reporting to ensure you're actually reducing risk across your organisation. Provides automated reporting and workflows on compliance SLAs, based on risk and priority.