Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2514 results found

2514 results found in Lot 2: Cloud software in the category Security

  • Computacenter - Proofpoint Core P0

    Computacenter (UK) Ltd

    Combat email threats comprehensively with end-to-end solutions, spanning detection to response. Automate abuse mailbox handling to swiftly eliminate user-flagged phishing emails. Tackle diverse threats like phishing, BEC, supplier fraud, ransomware, and malware. Enhance visibility into attack targets, methods, user responses, and compromises for proactive defense strategies.

  • Proofpoint P1 Bundle

    BYTES SOFTWARE SERVICES LIMITED

    Train end users to be more resilient against threats they receive. Augment threat protection with a robust security awareness training programme that integrates with your email security controls and includes phishing simulations, cultural and knowledge assessments, comprehensive training and awareness materials. bssgc

  • Cloudflare Zero Trust Network Access (ZTNA)

    Cloudflare, Inc.

    Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.

  • Rapid7 - Insight AppSec

    SOFTCAT PLC

    InsightAppSec part of Rapid7's security suite, providing Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are getting complex, utilizing JavaScript frameworks, like React and Angular, that provide a richer experience and easier path to full feature sets, but also present challenges to secure those apps.

  • NAZAR X Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    Detecting and Preventing breaches. XDR / MDR / SIEM / SOC. Monitoring and detection as a fully managed Service

  • Check Point Harmony Endpoint

    SOFTCAT PLC

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • SharePoint Development, Training and Support Services

    CLOUD COVER IT SERVICES LTD T/A Flyte

    SharePoint specialists working with large multinationals to SMEs to design, develop, and support SharePoint solutions (including 2010/13/16, and Office 365 SharePoint). CCIT provides consultancy, design, development, migration, integration, training, hosting, maintenance, and support of SharePoint. Our bespoke solutions drive productivity, improve efficiency, empower teamwork, and introduce new ways of working.

  • Threat Intelligence Services

    LEFKE IT LIMITED

    LefkeIT delivers comprehensive Threat Intelligence Services. Our expert team monitors global threats, analyzes trends, and provides actionable insights tailored to your organization's risk profile. With proactive threat detection and response measures, we help fortify your defenses against evolving cyber threats, ensuring resilience and protection of your assets.

  • Multi-Agency Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empower users to have complete control of managing multi-agency working. Secure, scalable, with UK GDPR and DPA Pt3 customer special terms. Hosted in UK it offers quick and flexible deployment with no upfront costs. Full multi-agency working technology platform providingg full UK data sovereignty for efficient, sustainable, and legal operations.

  • Computacenter - Hashicorp Cloud Platform (HCP) Consul

    Computacenter (UK) Ltd

    HCP Consul, a fully managed service mesh to discover and securely connect services in AWS. Providing an easy path to adopt service mesh for both individuals and organisations while reducing the operational burden of running it in production. HCP Consul is offered in both an on-demand and annual subscription offering.

  • Cloudlake Backup for M365

    AUTODATA PRODUCTS LIMITED

    Cloudlake Backup for M365 (powered by Veeam) protects organisations from undetected deletions, corruption and both internal and external threats. Our unique model allows you to protect Exchange, Teams, Sharepoint and OneDrive for Business against any event, whilst ensuring you only purchase exactly what you need with no wasted expense.

  • Check Point Harmony Endpoint

    Charterhouse Voice & Data

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Data Security and Privacy Services

    DEFENCE DATASEC LTD

    Defence DataSec delivers top-tier Data Security and Privacy Services, safeguarding your sensitive information from threats and ensuring compliance with regulations.Through advanced encryption, access controls, and monitoring, we protect your data assets from unauthorized access and breaches. Partner with us to mitigate risks, build customer trust, and uphold data privacy standards.

  • Cyber Resilience Training Platform (SaaS)

    CYBEXER TECHNOLOGIES

    The Cyber Resilience Training Platform (SaaS) delivers a cloud-based solution for organizations to practice cyber resilience. It provides scalable, realistic simulations tailored to business and public sector cyber threats, emphasizing response and recovery to ensure organizations can withstand and quickly rebound from cyber incidents.

  • Check Point Harmony Mobile

    Charterhouse Voice & Data

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • boxxe Digital Certificate Lifecycle Management - Command SaaS Lite

    BOXXE LIMITED

    Manage digital/TLS certificates in cloud, with CA agnostic Keyfactor Command. Discover all of your certificates, public & private, across your enterprise & achieve single screen visibility & control.

  • Dockerization of Development Environments

    DEFENCE DATASEC LTD

    At Defence DataSec, our Dockerization of Development Environments service is tailored for Government Departments, facilitating streamlined and consistent software development workflows. We specialize in containerizing development environments using Docker, ensuring portability, reproducibility, and scalability. Trust us to optimize your development process for efficiency and agility with Docker.

  • Vulnerability Assessment and Intelligence Services as a service (VAaaS)

    Proact IT UK Limited

    Proact’s Vulnerability Assessment as a Service (VAaaS) provides a vulnerability analysis service that enhances traditional options with specialist security analysis, advice and remediation recommendations, and robust ITIL ® based support and service management processes. Proact's security specialists will advise and remediation options threat landscape and enterprise security best practices.

  • Workday Implementation Services

    HYPER TALENT SOLUTIONS LTD

    At Hyper Talent Solutions Ltd, our Workday Implementation Services are tailored for Government Departments, ensuring seamless deployment and optimization of Workday solutions. From planning to execution, we specialize in configuring, customizing, and integrating Workday applications to meet your organization's unique needs.Trust us to deliver efficient, user-friendly, and transformative Workday implementations.

  • boxxe Druva Phoenix

    BOXXE LIMITED

    Phoenix is a SaaS service which allows organisations to backup and protect their file, database and Vm data, such as Vmware, SQL or NAS utilising the cloud. Customers are able to configure, administer and manage their backup estate utilising a single cloud based console.

  • Robotic Process Automation (RPA) and Intelligent Automation (IA) Services

    VE3 GLOBAL LTD

    Robotic Process Automation (RPA) is our expertise and service category. VE3 delivers straightforward solutions, empowering businesses to operate more efficiently. We offer flexible support services that adapt to your evolving needs, addressing real challenges to deliver tangible, measurable benefits for you and your users.

  • CDW CrowdStrike Application Security Posture Management

    CDW LIMITED

    CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • Armour Bridge - Secure Messaging Gateway

    Armour Comms

    Armour Bridge provides secure controlled access between Armour Mobile and third party Instant Messaging (IM) / chat applications. It supports cross domain interoperability and can use popular open-source capabilities like Matrix to exchange messages with consumer apps like Signal or WhatsApp.

  • Cloud Insights

    NETAPP

    NetApp Cloud Insights is a monitoring tool that gives you visibility into your complete hybrid cloud infrastructure. With Cloud Insights, you can monitor, troubleshoot and optimize all your resources including your public clouds and your private data centers.

  • CheckPoint Harmony Email & Collaboration

    BYTES SOFTWARE SERVICES LIMITED

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss. bssgc

  • Office 365 Exchange Advanced Threat Protection

    VE3 GLOBAL LTD

    VE3's email protection defends against sophisticated threats in real-time, with automated analysis and detonation of suspicious content and URLs. Gain insights into targeted individuals and attack categories, with features for investigating blocked messages and tracing URLs, ensuring proactive cybersecurity measures.

  • Big Data and Cloud Offerings

    VE3 GLOBAL LTD

    Bigdata Services - Consulting, Integration,Infrastructure & Sustenance Services, Development,Migration & Upgrade Data On Cloud Services: Data Platform Modernizations - Hadoop Migration,Appliance Offload,Mainframe Migration,SaaS-PaaS-IaaS transformation Setting Up Cloud Platforms - Cloud Data Lakes, Data Warehouse,Data Management Services, Advanced Analytics and AI Services Poly-Cloud Platforms -Best-of-Breed Cloud Data Platforms,Workloads Optimization.

  • Proofpoint Security Awareness Training

    PHOENIX SOFTWARE LIMITED

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • Tenable Vulnerability Management

    SAPPHIRE TECHNOLOGIES LIMITED

    Risk-based view of your identified vulnerabilities to identify, investigate and prioritise what is most critical. Managed in the cloud, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time assessment of your organisation. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and prioritise remediations

  • Proact Security Log Management Service (Microsoft Sentinel)

    Proact IT UK Limited

    Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).