Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2499 results found

2499 results found in Lot 2: Cloud software in the category Security

  • Intelligent Document Understanding - UiPath

    VE3 GLOBAL LTD

    Our certified Consultants offer top-notch Automation Solutions utilizing cutting-edge technologies including AI (Artificial Intelligence), Low-Code BPM (Business Process Management), Process/Task Mining, OCR (Optical Character Recognition), ODM (Operational Decision Management), and Virtual Assistants/Chatbots. We have partnerships with industry-leading companies like ABBYY, AutomationHero, Bizagi, Camunda, Celonis, IBM, Soroco, and UiPath.

  • Forescout NetSec Core

    Cyberlab

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assests.

  • WithSecure EPP & EDR

    IOCO SOLUTIONS LIMITED

    WithSecure™ Elements is the unified cloud-based cyber security platform designed to reduce risk, complexity, and inefficiency. WithSecure™ Elements combines powerful predictive, preventive, and responsive security capabilities – all managed and monitored through a single security center.

  • Knowbe4 Cyber Security Awareness Training

    Glemnet Ltd

    Your employees are frequently exposed to sophisticated social engineering attacks. It is time for a comprehensive approach to effectively manage this problem, managed by people with a technical background. The world's largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters.

  • Cyber Security

    CYMBALSTREAM SOLUTIONS LIMITED

    Cymbalstream offers a range of security solutions, including Managed Detection and Response (MDR), Cloud Detection and Response (CDR), and other advanced cybersecurity services. Cymbalstream leverages Arctic Wolf's technologies, threat intelligence, and expert security analysts to deliver 24/7 monitoring, detection, and response across an organisation's IT infrastructure.

  • Google Cloud Application Modernization Services

    DEFENCE DATASEC LTD

    Defence DataSec offers top-tier Google Cloud Application Modernization Services, revamping legacy systems for enhanced performance, scalability,and agility.Our expert team leverages Google Cloud's cutting-edge technologies to modernize applications,containerize workloads, and streamline deployment processes.Trust us to accelerate your digital transformation journey,empowering your organization with modernized applications that drive innovation and competitive advantage.

  • Rapid7 Insight ThreatCommand

    INTEGRITY360 LIMITED

    Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you to make informed decisions and rapidly respond to protect your business.

  • CDW Palo Alto Cortex XDR

    CDW LIMITED

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency.

  • SotaPROTECT Suite

    Sota Solutions Ltd

    SotaPROTECT Suite provide managed anti-virus, email security gateway, web security gateway, Multi-Factor Authentication and cyber security awareness training for staff. This provides an essential level of protection against cyber bad actors.

  • Cyber security risk assessment & planning

    I-NET SOFTWARE SOLUTIONS LTD

    A Digital Service Management (DSM) enabler,this service provides an assessment of your Cyber Security practices.Focused on capabilities associated with technology services and environment to: strengthen cybersecurity capabilities, enable effective and consistent evaluation and benchmark of cybersecurity capabilities. We enable prioritisation of actions and investments to improve security. unstructured big data.

  • Globalscape EFT Arcus (Fortra) - From HANDD Business Solutions (MFT)

    HANDD Business Solutions

    Globalscape EFT Arcus is a cloud-native, managed file transfer solution designed for scalability and security. It offers flexible deployment options, automated workflows, and advanced encryption for secure data transfer. Arcus simplifies file sharing across organisations while ensuring compliance with regulations and industry standards.

  • Pathlock Cloud Continuous Controls Monitoring (CCM) for SAP

    RESULTING LIMITED

    Pathlock Cloud CCM offers a comprehensive toolkit to enhance risk identification and assessment, reduce manual compliance controls efforts, and improve operational excellence. With this solution, organisations can streamline their process controls and mitigate risks more efficiently, enhancing their overall performance and success.

  • Stone Managed Internet Security Service - Cisco Umbrella

    Stone Technologies Limited Trading as Converge Technology Solutions

    Stone utilises Cisco Umbrella to deliver the most secure, reliable, and fastest internet experience to more than 100million users daily. Umbrella unifies firewall, secure web gateway, DNS-layer security, cloud access security broker (CASB), and threat intelligence solutions into a single platform to help businesses of all sizes secure their network.

  • CDW Check Point CloudGuard Cloud Security Posture Management (CSPM)

    CDW LIMITED

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.

  • CDW Sophos Network Detection and Response (NDR)

    CDW LIMITED

    "Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • Cisco Meraki Networking by ITGL

    Conscia UK

    Services to cover all Cisco Meraki Software including Switches, Access Points, Firewalls, SD-WAN, IoT sensors, Cameras, Cellular gateways and Secure Access Services Edge (SASE). The Meraki dashboard is a key enabler of this service.

  • Gimmal Link Enterprise

    OFFICELABS LIMITED

    Gimmal Link stores SAP content and data within Microsoft SharePoint and Microsoft 365 while leaving the SAP environment and the SAP end user’s view unchanged. This integration allows users inside and outside of SAP to collaborate and work on the same document-centric business processes while reducing total cost of ownership.

  • Google Workspace Enterprise Essentials

    LEVETT CONSULTANCY LIMITED

    Essentials editions are designed to integrate seamlessly with your existing email solution, providing your organisation with collaboration tools, video conferencing, and enterprise-grade security. All Essentials editions offer seamless integration with your existing solutions, creating a productive hybrid environment for your end-users.

  • De-installation / Decommissioning Telecoms and ICT

    Network 2 Supplies Ltd

    N2S are specialists in large scale multi-site De-installations and decommissioning of IT equipment including desktops, screens, unified comms/telephony and managed print. Utilise a fleet of tracked vehicles to return equipment to headquarters for WEEE recycling or resale.

  • Managed Security Logging as a service

    Proact IT UK Limited

    Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support.

  • SAP HANA Services

    LEFKE IT LIMITED

    At LefkeIT, our SAP HANA Services are designed to empower Government Departments with advanced analytics, real-time insights, and enhanced performance. We specialize in implementing, optimizing, and managing SAP HANA environments, unlocking the full potential of in-memory computing for your organization.

  • Rapid7 InsightVM Continuous Vulnerability Assessment

    ITHQ LTD

    InsightVM provides highly available, scalable & efficient vulnerability assessments and risk scoring. InsightVM discovers vulnerabilities in real-time and prioritises them for your team with executive reporting to ensure you're actually reducing risk across your organisation. Provides automated reporting and workflows on compliance SLAs, based on risk and priority.

  • Data Science Cloud Services

    I-NET SOFTWARE SOLUTIONS LTD

    data science cloud services bring together the components and data science expertise required to unlock the benefits of migration to the Cloud. We provide the discovery, understanding of business outcomes, advanced analytical techniques, and data 'squads' with expertise in Cloud-based data tools, algorithms and statistical packages.

  • iProov Authentication Solution

    iProov Limited

    iProov Authentication delivers secure and convenient citizen and workforce authentication leveraging face, fingerprint, and/or palm biometrics. Cloud-based biometrics linked to a trusted identity allows individuals to smoothly authenticate across the entire identity lifecycle, from Account Login and Recovery to Device Binding and Step-up Authentication.

  • SentinelOne Endpoint Security Platform

    CYBANETIX LIMITED

    SentinelOne Endpoint Protection unifies prevention, detection, and response in a single purpose-built agent powered by machine learning and automation. It provides prevention and detection of attacks across all major vectors, rapid elimination of threats with automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics.

  • KnowBe4 KMSAT

    INTEGRITY360 LIMITED

    Combining the most comprehensive library of engaging, localised content, AI-driven simulated phishing, training recommendations, enterprise-grade reporting and robust user testing and assessments to drive awareness and change behaviour. KnowBe4’s Kevin Mitnick Security Awareness Training platform reduces an organisation’s Phish-prone Percentage from over 30% initially to under 5% after 12 months.

  • Sophos Intercept X Advanced with XDR

    Cyberlab

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Exchange Online Protection

    VE3 GLOBAL LTD

    Exchange Online Protection safeguards your cloud-based or on-premises email with anti-spam and anti-malware protection. It offers financially backed SLAs and guarantees 99.999% network uptime, effectively shielding against 100% of known viruses and 99% of spam. Additionally, it provides reporting and message trace capabilities along with policy-based filtering.

  • Email Authentication Platform, incorporating SPF, DKIM, DMARC, BIMI, MTA-STS & TLS-RPT.

    Infosec Ventures

    EmailAuthentication-as-a-Service platform enables Brand Protection, Anti-Spoofing, Anti-Phishing, enhances email deliverability and provides full visibility of email as a channel. It uses SPF, DKIM, BIMI and DMARC. DMARC is part of the Active Cyber Defence Program. We provide Security Awareness & Training alongwith EmailRemediation to mitigate risk at the Human Layer.

  • CDW Microsoft Office 365 Plan E1

    CDW LIMITED

    Online versions of Office with email, instant messaging, video conferencing and co-authoring. Anti-virus and anti-spam, 50Gb mailbox, 1TB file storage, HD video conferencing, Office Online, Team Sites and Enterprise Social Networking.