Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1698 results found

1698 results found in Lot 2: Cloud software in the category Security risk management

  • Secure Schools Online Cyber Security Auditing and Testing Platform

    EVOUCHERS LTD

    Secure Schools (part of Wonde Ltd) Online Cyber Security Auditing and Testing Platform enables schools and academy trusts to perform an independent review and assurance of their cyber risk.

  • Forescout NetSec Automation & Control Bundle

    CHESS ICT LIMITED

    Network Security Automation & Control delivers real-time and continuous visibility across all asset types and enables secure and compliant connectivity between all asset types within the network. Organizations can automate compliance and policy control and enable quick incident recovery while integrating and automating workflows for improved cybersecurity response.

  • Fortra Data Classification Suite DCS (Formerly Titus) - From HANDD Business Solutions

    HANDD BUSINESS SOLUTIONS LIMITED

    Fortra Data Classification Suite (Formerly Titus) allows you to organise and label data according to its sensitivity and importance. Protect sensitive information by assigning rich content labels and persistent metadata. Fortra DCS aids enforcement of data security policies and ensures compliance with regulations of data on-premise and in the cloud.

  • ULTRA Remote Browser Isolation (RBI)

    Garrison Technology Ltd

    Garrison ULTRA is a highly performant, full browser isolation cloud service. Garrison ULTRA leverages Garrison’s unique hardware enforced browser isolation technology, trusted by governments around the world, enabling users to safely visit ‘risky’ websites and providing a scalable service that protects from all web-based attacks, including phishing and malware threats.

  • CrowdStrike Falcon Complete MDR

    SOFTCAT PLC

    Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.

  • iManage Implementation, Training and Support

    QUORUM NETWORK RESOURCES LTD.

    A full, end-to-end service for iManage Work from implementation, deployment, training and support. iManage Work is the leading email and document management system providing a fully audited, secure, intuitive email and document repository. iManage integrates with Microsoft Office, Office 365 and leverages modern technology such as AI and machine learning.

  • Tenable Identity Exposure

    BYTES SOFTWARE SERVICES LIMITED

    Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited. bssgc

  • Extended Detection and Response (XDR) - SentinelOne

    RAZOR THORN SECURITY LTD

    Autonomous cybersecurity platform that consolidates security functions across surfaces-endpoints, cloud, identity, and makes intelligent use of partner integrations. SentinelOne strives to extend our native detection and response capabilities with XDR integrations to improve workflows and provide more human context to enterprise security teams.

  • MTI VMware by Broadcom - Virtualisation and Cloud computing

    MTI TECHNOLOGY LIMITED

    MTI has been granted Pinnacle status in the new landscape with Broadcom. This is the highest partner status for VMware; we are now one of only twelve partners in the UK holding this channel partner status. MTI has demonstrated its expertise in designing, deploying, and managing VMware datacentre virtualisation solutions.

  • Workspace ONE UEM

    XTRAVIRT LIMITED

    Workspace ONE UEM is the secure enterprise platform that delivers and manages any app on any device. By integrating app management, unified endpoint management, and real-time application delivery, Workspace ONE UEM engages digital employees, reduces the threat of data loss, and modernizes traditional IT operations for the mobile-cloud era.

  • AvePoint Cloud Governance for Microsot 365

    PHOENIX SOFTWARE LIMITED

    "M365 is an essential productivity solution millions of people use every day. With that use comes significant challenges in how you can scale your management and security of the platform. Implement an extensible governance framework that empowers users, is easy to maintain, and scales with your organization."

  • Stone Cisco ThousandEyes

    Stone Technologies Limited Trading as Converge Technology Solutions

    The Cisco ThousandEyes Cloud Service is a suite of cloud services designed to help measure/monitor the availability and performance of web applications, hosted services, and networks. The ThousandEyes internet and cloud intelligence platform expands visibility, insights, and action into digital delivery of applications and services over the internet and cloud.

  • Barrier Networks Crowdstrike Application Security Posture Management

    BARRIER NETWORKS LIMITED

    CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic. Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • Data Intelligence Platform: Data Governance and Data Catalogue Solution

    COLLIBRA UK LIMITED

    Collibra provides a solution covering data governance, stewardship, metadata processing, business glossary, dictionary, data marketplace and catalogue. This enables business users to find their data easily, understand where it has come from and be able to trust the quality of the data. Collibra only processes metadata: data about the data.

  • Microsoft Defender Licenses - CoreGov

    CORE TECHNOLOGY SYSTEMS (U.K.) LIMITED

    The Microsoft Defender product suite provides a range of best in class prevent breach and report breach products to enable customers to secure and monitor their environments. Defender products are compatible with Microsoft Security Centre, Sentinel and all Microsoft products and environments.

  • Proofpoint Advanced Package

    SOFTCAT PLC

    Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.

  • Beyondtrust Privileged Remote Access

    CYBERIAM HOLDINGS LIMITED

    BeyondTrust Privileged Remote Access, Secure, manage, and audit vendor and internal remote privileged access without a VPN. Eliminate a Cybersecurity Threat Vector and Meet Privileged Access Compliance Requirements.

  • Multi-cloud Network and Network Security Assessment Service

    I-NET SOFTWARE SOLUTIONS LTD

    This assessment service is designed to review and analyse an organisations current multi-cloud deployment against the our multi-cloud good practice blueprint. Data backed recommendations will then be made against the goal of unifying and streamlining multi-cloud architecture and operations

  • Enterprise Risk Management

    TMC3 LIMITED

    Enterprise Risk Management by OneTrust. The platform enables organisations to streamline and efficiently manage operational risks across the enterprise. Automated workflows simplify risk identification and intelligently flag risks based on your desired scoring methodology, helping to identify your risk posture in real-time and track risk against business initiatives.

  • Barracuda Log Security 24 X 7 Detection & Response

    SCG CORPORATE LIMITED

    Barracuda MSP Log Security Monitoring is a managed security that collects, aggregates, and normalizes log data from hundreds of sources for AI-enabled analysis using BMSP’s analytics platform, SIEM, threat intelligence, and 24/7 365 SOC. Identify threat-like behavior in your systems such as impossible logins, multi-factor bypass & coordinated attacks.

  • Valimail Enforce- Next-Gen DMARC-as-a-service

    GRADIAN SYSTEMS LTD

    With no means to authoritatively identify the sender, anyone can easily impersonate sending domains. Valimail is the only fully automated, anti-phishing platform that governs DMARC, DKIM, Unlimited SPF & BIMI. Only full automation provides a guaranteed path to rapid and critically, safe enforcement of DMARC.

  • HCL Domino

    INTEC SYSTEMS LIMITED

    HCL Domino is a Rapid Application Development (RAD) platform which can be customised and helps companies build and launch applications faster.

  • AMS Request Portal - SAR, FOI

    AMS

    AMS Request Portal is an encrypted solution developed specifically for the NHS, allowing submission of Subject Access Requests (SAR), Freedom of Information Requests (FOI), and other request types via online forms. End-to-end request management and secure electronic record delivery. Adhere to strict deadlines, control requests and run full KPI reports.

  • Proofpoint Threat Protection Suite

    BYTES SOFTWARE SERVICES LIMITED

    Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs. bssgc

  • Aiimi Insight Engine – Data Science

    AIIMI LIMITED

    Extend the reach of your data science and analytics projects to incorporate new sources of information. Aiimi Insight Engine provides access to metadata extracted from structured and unstructured (document / email) data sources and makes the information available read/write through its Data Science API.

  • IRIS Intelligence Legal and Regulatory Remediation Software

    IRIS INTELLIGENCE LIMITED

    IRIS Legal & Regulatory Remediation Software provides a simple roadmap through the complexity of regulatory compliance. IRIS-LRR will help you assess the current state of regulatory compliance, understand gaps then plan and track the program of activity to successfully achieve the requirements on frameworks including GDPR, CCPA, ISO27000, NIST SP800-53.

  • CGR Foundation

    Clew

    CGR Foundation (CGRF) allows users to clearly and visually integrate risk, compliance and other business processes (including incidents and issues). This activity is connected through real-time action management and communicated through concise reporting - including cost/benefit analysis. The resulting live and collaborative picture enhances decision-making whilst also delivering efficiency benefit.

  • Concepta XDR & SOC

    NVT Group

    Concepta XDR & SOC is an all-in-one cyber security platform. It includes all the prevention, detection, correlation, investigation and response you need, backed by a 24/7 Security Operations Centre (SOC) service, without the traditional costs and complexities.

  • Forescout Zero Trust Assurance

    CHESS ICT LIMITED

    Zero Trust Assurance delivers an adaptive approach for constructing and reinforcing network resilience against unauthorized access and lateral threats with real-time insight over all connected devices - from automated policy enforcement, advanced segmentation, integration into the cybersecurity ecosystem, and the ability to swiftly respond to and recover from incidents

  • Cloud Forensics_BLD

    BLUELIGHTSDIGITAL LTD

    A digital forensics service that supports extraction of data from global cloud services such as AWS, Google and iCloud, along with a large variety of other cloud services. Supporting extraction of email, data from IoT devices and provides users with an automated web capture feature and real-time extraction monitoring.