Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Ingress / EDRMSaaS Content Services Platform

    iCognition Pty Ltd

    Ingress built on EDRMSaaS by iCognition is a Content Services Platform that you can use to build and deliver enterprise-wide automated processes, Use it to find and manage content quickly and easily across multiple repositories: Teams, SharePoint, Exchange, OneDrive, OpenText and others.

  • boxxe Sophos Network Detection and Response

    BOXXE LIMITED

    Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating

  • Mimecast Perimeter Defence Plan (Zone 1)

    Chess CyberSecurity Ltd t/a CyberLab

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Sophos Managed Detection and Response Essentials (MDR) Endpoint

    CHESS ICT LIMITED

    "Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications."

  • Business Operations Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empower users to have complete control of Business Operations Case Management. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Forcepoint Next Generation Firewall (NGFW)

    SAPPHIRE TECHNOLOGIES LIMITED

    Enterprise SD-WAN connectivity and NGFW security for distributed enterprises. Use SD-WAN to replace costly MPLS. Accelerate Office 365 performance, boost resilience without sacrificing security. Defend networks against emerging exploits and malware.

  • SEP2.security Managed Detection & Response (MDR)

    SEP2 LIMITED

    SEP2.security MDR is a cloud-based threat detection and response platform. SEP2 are assisting organisations with honing in on and eradicating threats, building upon Google's Chronicle platforms for SIEM and SOAR.

  • Static Application Security Testing (SAST)

    TMC3 LIMITED

    Veracode Static Analysis (SAST) is an enterprise-class application security solution, which allows DevOps teams to shift-left in their security approach. Veracode Static Analysis provides fast, automated feedback to developers in the IDE and CI/CD pipeline, conducts a full Policy Scan before deployment, and gives clear guidance to fix issues fast.

  • HYDRAX Secure Mobile Device Management Service

    PHONEHUB IO LTD

    Hydrax is a cloud managed, ultra-secure locked-down operating system for mobile devices such as tablets and phones, enabling them to be used by prisoners and prison staff in custodial environments without the risk of abuse. It has been fully penetration tested and deemed fit for use in prisons.

  • Logit.io Logging as a Service and Observability

    LOGIT.IO LTD

    The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • F5 BigIP VE Distributed Cloud, Silverline/App Protect, Nginx & Evolve Support

    BLUEFORT SECURITY LIMITED

    F5 Licensing to facilitate Local /Global Load Balancing / Access Policy Manager (VPN) /Advanced Firewall Manager / DNS / App Security Manager / Big IQ Management/Waap/F5 Distributed Cloud Services Essential App Protect & Nginx sundry services to support installation / training.

  • boxxe Sophos Intercept X Advanced with XDR

    BOXXE LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Palo Alto Prisma Cloud

    SOFTCAT PLC

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multi-cloud environments.

  • Palo Alto Networks Cyber Security by ITGL

    CONSCIA GROUP UK LTD

    Services to cover all Palo Alto Security Products including NGFW Firewalls, IPS, Panorama, Cortex XDR, Cortex XSOAR, DNS Security, Prisma Access, Prisma SASE, Prisma Cloud, Enterprise DLP.  Assistance towards achieving Cyber Essentials accreditation.

  • Business Continuity, Resilience and Risk Management Software with Hosting (SaaS)

    CONTINUITY2 LIMITED

    "Meridian" BCMS is a web based tool designed to automate and alleviate the everyday management of an organisation’s Business Continuity Management System and delivers compliance to ISO22301 and FCA Operational Resilience standards. The system delivers all aspects of Resilience ,Risk Assessments , BIAs, Dependency Mapping, Scenarios Planning, Testing, Notification/Incident Management.

  • Entity Resolution Driven Data Analysis And Exploitation Service

    DATA-EDGE ANALYTICS LTD

    The service provides a single view of an entity. It resolves entities (organisations/people/objects) from records, at scale, in real time, with full 'explainability'. The system incorporates data transformation, pipelines, ingestion, storage, alerting, entity analysis, graphing and visualisation tools for users. The system feeds downstream analysis systems.

  • High-Threat coc00n Device Protection

    COC00N CYBER LIMITED

    coc00n High Threat Deployment is a premier cybersecurity solution specifically designed for individuals operating in high information risk environments. The solution leverages advanced technical products to provide round-the-clock protection for personal devices, safeguarding against sophisticated cyber threats that target physical safety, data security, and personal privacy.

  • MTI Palo Alto Networks

    MTI TECHNOLOGY LIMITED

    (Palo Alto Networks Cortex XSOAR), (Palo Alto Networks Cortex XDR), (Palo Alto Networks Prisma Cloud), (Palo Alto Networks Prisma SaaS), (Palo Alto Networks VM-Series Next-Generation Firewalls). Palo Alto Networks offers an enterprise cybersecurity platform which provides network security, cloud security, endpoint protection, and various cloud-delivered security services.

  • Crowdstrike Falcon Next gen SIEM Licences

    MONDAS CONSULTING LTD

    Purchase Crowdstrike Next Gen SIEM licences to utilise the power of Crowdstrike to collate log data from all of your security stack and generate alarms for a SOC team to triage. Crowdstrike Next Gen SIEM can remediate these alarms using powerful automated playbook actions.

  • Tessian ICES

    INTEGRITY360 LIMITED

    Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • Micro Focus, now OpenText - OpenText Core IAM Foundation on SaaS

    MICRO FOCUS SOFTWARE UK LTD

    OpenText Core IAM Foundation provides essential Identity and Access Management capabilities that organizations need to support a secure IAM program. The OpenText Core IAM Foundation provides: • Identity Governance • Advanced Authentication Limited – a Multi-Factor Authentication (MFA) framework • Password Management • Identity Intelligence Basic

  • Logpoint Converged SIEM and SOAR

    ARMADILLO SEC LTD

    Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. Providing a comprehensive and centralised view of the security posture of an IT infrastructure.

  • CDW AvePoint EnPower for Microsoft 365

    CDW LIMITED

    As appetites continue to grow to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft365. AvePoint EnPower equips IT teams to pivot as needs and requirements change without worrying about what model makes sense in that moment.

  • Egress Defend - Integrated Cloud Email Security

    Security Software Solutions Ltd (S3 Ltd)

    Egress Defend is Intelligent Cloud Email Security. It protects against data breaches by reducing human activated risk. Intelligent technologies using AI detect sophisticated phishing attacks, including BEC compromise and account takeover and engage users with contextual, colour-coded warnings embedded in suspicious emails.

  • Human Risk Management & Mitigation, Phishing Simulation, Security Awareness Training & DMARC

    Lloyds Ventures

    HumanFirewall measures, manages and mitigates risk at the Human Layer. Platform uses automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks. EmailAuth enables Brand-Protection, Anti-Spoofing and Enhances Email-Deliverability using DMARC, SPF, DKIM, MTA-STS, TLS-RPT & BIMI.

  • Armour Unity - Ultra Secure Video Conferencing for Sensitive & Higher Assurance Environments

    ARMOUR COMMUNICATIONS LIMITED

    Secure enterprise video conferencing, screen sharing and in-app messaging for iOS/ Android devices. Documents and chats associated with conference call benefit from the trusted security of the Armour mobile platform. Unity uses MIKEY-SAKKE IBE. Participants on a call can be certain that only other invited attendees can join the conference.

  • Tenable PCI-ASV

    PHOENIX SOFTWARE LIMITED

    Unlimited comprehensive scans identify and address vulnerabilities, ensuring PCI DSS compliance. The Tenable PCI ASV process follows strict guidelines, preventing vulnerabilities on payment card transaction networks for more than 90 days. This user guide assists with navigating the entire Tenable PCI ASV process

  • CheckPoint CloudGuard Web Application Firewall as a Service (WAFaaS)

    SOFTCAT PLC

    Web Application and API protection. With deep application contextual analysis, eliminates the trade-off between level of security and complexity of managing application security. Whether application is hosted in data centre or in a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks, blocks automated attacks (Bots)

  • IBM Watson Query

    IBM UNITED KINGDOM LIMITED

    IBM Watson Query allows you to query data across many systems without having to copy and replicate it, saving time and reducing costs. Watson Query queries data from its source, simplifying your analytics by providing the latest and most accurate data.

  • Palo Alto Networks Cortex XSOAR

    KHIPU NETWORKS LIMITED

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.