Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1563 results found

1563 results found in Lot 2: Cloud software in the category Secure content and threat management

  • SolarWinds Access Rights Manager (ARM) license

    Prosperon Networks Ltd

    SolarWinds® Access Rights Manager (ARM) is designed to assist IT and Security Administrators to quickly and easily provision, de-provision, manage and audit user access rights to systems, data, and files. ARM helps to protect organisations from the potential risks of data breaches, and demonstrate regulatory compliance.

  • Forcepoint Zero Trust Content Disarm and Reconstruction (ZTCDR)

    Cyberlab

    ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.

  • Kiosk design and development

    MTC MEDIA LIMITED

    mtc provides a full service digital design and development service agency providing a range of specialist services. Our kiosk user interface design and development service is aimed at independent theatre, cinema, and visitor attractions, using Spektrix as their ticket fulfilment and CRM software provider.

  • IBM DB2 Warehouse on Cloud

    IBM UNITED KINGDOM LIMITED

    IBM Db2 Warehouse on Cloud is A fully managed, elastic, cloud data warehouse built for high-performance analytics and machine learning available on IBM Cloud and AWS. It is part of Common SQL engine across all deployment options. IBM delivers an environment designed , managed and sized to meet those needs.

  • Cynet360

    INTEGRITY360 LIMITED

    Cynet 360 is the world’s first autonomous breach protection platform that consolidates and automates Monitoring & Control, Attack Prevention & Detection and Response Orchestration a Cynet 360 delivers these capabilities by use of Cynet Sensor Fusion™ to collect and analyze all endpoint, user, file, network activities across the environment.

  • CheckPoint - CloudGuard Cloud Security Posture Management

    VE3 GLOBAL LTD

    VE3 offers comprehensive security, governance, and compliance automation tailored for public clouds and Kubernetes environments. Our solution provides continuous visibility and control, empowering organizations to reduce their attack surface and defend against vulnerabilities, identity theft, and data loss within cloud environments.

  • Prisma Cloud

    LRQA

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.

  • Portnox

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Portnox provides comprehensive network access control solutions designed to secure organisations against cybersecurity threats by managing and monitoring every connected device in real time. It offers visibility, control, and policy enforcement across your network, ensuring secure access and compliance with IT and regulatory standards.

  • CDW Proofpoint P0 Bundle

    CDW LIMITED

    Proofpoint P0 bundle includes Email Protection, Targeted Attack Protection (TAP) and Threat Response Auto Pull (TRAP). The Secure Email Gateway includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP sandboxes attachments and URLs. TRAP Security Orchestration Automation Response for email removes malicious, delivered messages from inboxes.

  • LexisNexis® ThreatMetrix

    LEXISNEXIS RISK SOLUTIONS UK LIMITED

    ThreatMetrix provides best-in-class fraud, identity and authentication services to help digital businesses better distinguish good customers from potential fraudsters in real time, without adding unnecessary friction. Leveraging global intelligence from the Digital Identity Network, ThreatMetrix enables businesses to make more informed fraud and risk decisions.

  • Computacenter - CrowdStrike Falcon Data Protection

    Computacenter (UK) Ltd

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • MTI Firewall Managed Service

    MTI TECHNOLOGY LIMITED

    MTI – Managed Palo Alto Firewall Service offers around-the-clock support, deployment flexibility and predictable costs so you can rest assured that your firewall security is in safe hands and is securely configured at all times. The service provides firewall configuration, administration, monitoring, report generation, support, and on-site installation.

  • Tenable One (Standard and Enterprise)

    Khipu Networks Limited

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance. Enterprise option include tools for breach & attack mitigation and insight into the external attack surface. Includes other Tenable point products.

  • Sophos Managed Detection and Response Complete (MDR) Endpoint

    BYTES SOFTWARE SERVICES LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications. bssgc

  • Becrypt Sovereign CWE

    BECRYPT LIMITED

    Becrypt's Sovereign CWE service is designed for organisations looking to collaborate with HM Government and Industry partners, within the UK and Internationally.

  • Druva Data Resiliency Cloud - Hybrid Workloads

    PHOENIX SOFTWARE LIMITED

    Centralize local and remote data protection, single controls plane to manage data center backup and disaster recovery. Scalable, all-in-one backup, disaster recovery, archival and analytics. Simplifies data protection, reducing costs, and improving visibility. File Servers (Windows/Linux) Virtual Environments (Hyper-V,VMware,Nutanix) Databases (MS SQL,Oracle,SAP HANA) NAS/Shares AWS EC2 Azure VM and Discs

  • AppyHive for Education

    APPYHIVE LTD.

    Cloud-based service platform delivering secure, scalable, native mobile apps for educational institutions. Custom-branded, modular and fully tailored to your school’s identity, needs, and growth over time, reflecting the culture, branding, and unique operational needs. Apps are published on your behalf on both Apple App Store and Google Play as standard.

  • Stone Enterprise Network Security - Cisco Duo

    Stone Technologies Limited trading as Converge Technology Solutions

    Stone utilises Cisco Duo to provide Two Factor Authentication. Duo’s Trusted Access platform is a holistic security solution that reduces your risk of a data breach caused by compromised credentials, known vulnerabilities and/or exploits.

  • Ingress / EDRMSaaS Content Services Platform

    iCognition Pty Ltd

    Ingress built on EDRMSaaS by iCognition is a Content Services Platform that you can use to build and deliver enterprise-wide automated processes, Use it to find and manage content quickly and easily across multiple repositories: Teams, SharePoint, Exchange, OneDrive, OpenText and others.

  • boxxe Sophos Network Detection and Response

    BOXXE LIMITED

    Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating

  • Mimecast Perimeter Defence Plan (Zone 1)

    Cyberlab

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Sophos Managed Detection and Response Essentials (MDR) Endpoint

    CHESS ICT LIMITED

    "Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications."

  • Business Operations Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empower users to have complete control of Business Operations Case Management. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Forcepoint Next Generation Firewall (NGFW)

    SAPPHIRE TECHNOLOGIES LIMITED

    Enterprise SD-WAN connectivity and NGFW security for distributed enterprises. Use SD-WAN to replace costly MPLS. Accelerate Office 365 performance, boost resilience without sacrificing security. Defend networks against emerging exploits and malware.

  • SEP2.security Managed Detection & Response (MDR)

    SEP2 LIMITED

    SEP2.security MDR is a cloud-based threat detection and response platform. SEP2 are assisting organisations with honing in on and eradicating threats, building upon Google's Chronicle platforms for SIEM and SOAR.

  • Static Application Security Testing (SAST)

    TMC3 LIMITED

    Veracode Static Analysis (SAST) is an enterprise-class application security solution, which allows DevOps teams to shift-left in their security approach. Veracode Static Analysis provides fast, automated feedback to developers in the IDE and CI/CD pipeline, conducts a full Policy Scan before deployment, and gives clear guidance to fix issues fast.

  • HYDRAX Secure Mobile Device Management Service

    PHONEHUB IO LTD

    Hydrax is a cloud managed, ultra-secure locked-down operating system for mobile devices such as tablets and phones, enabling them to be used by prisoners and prison staff in custodial environments without the risk of abuse. It has been fully penetration tested and deemed fit for use in prisons.

  • Logit.io Logging as a Service and Observability

    Logit.io

    The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • F5 BigIP VE Distributed Cloud, Silverline/App Protect, Nginx & Evolve Support

    BLUEFORT SECURITY LIMITED

    F5 Licensing to facilitate Local /Global Load Balancing / Access Policy Manager (VPN) /Advanced Firewall Manager / DNS / App Security Manager / Big IQ Management/Waap/F5 Distributed Cloud Services Essential App Protect & Nginx sundry services to support installation / training.

  • boxxe Sophos Intercept X Advanced with XDR

    BOXXE LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.