Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1537 results found

1537 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Computacenter - ProofPoint Tessian DLP

    Computacenter (UK) Ltd

    Adaptive Email DLP uses behavioural-AI to learn about employees’ normal email sending behaviours, their trusted relationships and how they communicate sensitive data. It then analyses each email to detect anomalous behaviour, notifying admins of potential incidents. And it warns the user in real time, preventing sensitive data loss through email.

  • Abnormal Email Security

    Gradian Systems Ltd

    Abnormal provides unprecedented protection against attacks that target human behaviour, including socially-engineered threats, vendor fraud, and cloud account takeovers. This approach stops 70% more attacks than SEGs, including payloadless emails, which made up 24% of all blocked attacks in 2023.

  • Microsoft Office 365 Threat Intelligence

    Ve3 Global Ltd

    VE3 offers comprehensive threat landscape analysis services for organizations, leveraging data from Windows endpoints, Azure Advanced Threat Analytics, and Office 365 Advanced Threat Protection. Our solution alerts security administrators to potential threats, enabling them to track threat actors and trends effectively, ultimately enhancing asset defence capabilities.

  • Forescout Automation & Control

    Chess CyberSecurity Ltd

    Network Security Automation & Control delivers real-time and continuous visibility across all asset types and enables secure and compliant connectivity between all asset types within the network. Organizations can automate compliance and policy control and enable quick incident recovery while integrating and automating workflows for improved cybersecurity response.

  • Sophos Firewall

    Chess CyberSecurity Ltd

    XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Crowdstrike Falcon Security Platfrom

    BlueFort Security Ltd

    CrowdStrike secures critical areas of risk, endpoints, cloud workloads, identity and data to keep ahead of adversaries and stop breaches. CrowdStrike's Security platform leverages real-time indicators of attack, threat intelligence and enriched telemetry to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities

  • Microsoft Online Services and Agreements

    Bytes Software Services

    Select your tailored Microsoft agreement from the complete range of Microsoft online services and software. bssgc

  • Sophos Network Detection and Response

    Phoenix Software Ltd

    Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • Palo Alto Cortex Xpanse

    Charterhouse Voice & Data

    Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services. Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.

  • CDW Check Point CloudGuard Web Application Firewall (WAFaaS)

    CDW Limited

    Check Point CloudGuard WAF provides Web Application and API protection. With deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security.

  • XM Cyber Attack Path Management

    Softcat Limited

    The XM Cyber platform continuosly and safely runs attack simulations across Hybrid Cloud environments, identifying misconfigurations, vulnerabilities, lack of segmentation, over permissioned users and user beaviour that can allow an attacker to laterally move and compromise critical assets. XM Cyber prioritises the issues/devices/accounts that put the critical assets at risk,

  • ForeScout EyeSight/EyeControl/EyeInspect

    INTEGRITY360 LIMITED

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assests.

  • Palo Alto Cortex Xpanse

    Softcat Limited

    Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services. Cortex XPanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.

  • ePEP (Electronic Personal Education Plan)

    eGov Solutions LTD

    ePEP Single Sign-On Electronic Personal Education Plan for Looked After Children. The largest hosted ePEP platform for Looked After and Vulnerable Children. Developed and fully maintained by market leaders eGOV Solutions for Local Authorities Virtual Schools and Education Providers. Offering combined automatic attendance/attainment collection services, analytical PEP-dashboards and ePEP reports.

  • CyberArk Secure Cloud Access

    INTEGRITY360 LIMITED

    The CyberArk-Identity-Security-Platform provides controls to secure access to every layer of a cloud-environment-from cloud-native services to dynamic-workloads running on the cloud to lift-and-shift-workloads and SaaS-applications. CyberArk-Secure-Cloud-Access provides Just-in-time(JIT) access with Zero-Standing-Privileges. The solution analyzes cloud-entitlements and offers an Insight-to-Action framework to accelerate risk-reduction and time-to-value through migration to safer access-policies.

  • Rapid7 InsightIDR

    INTEGRITY360 LIMITED

    Your cloud SIEM for modern threat detection and response. InsightIDR provides immediate and accurate threat detection and drastically reduces the time to respond to attacks by combining behavioural analytics, threat intelligence, and automation in a scalable, easy to love solution that boasts the fastest deployment times in the industry.

  • Illumio Zero Trust Segmentation Platform

    Softcat Limited

    Illumio offers a comprehensive platform for micro-segmentation and security. It provides real-time visibility into application traffic, enabling precise control over communication pathways. This enhances security by minimizing attack surfaces and ensuring compliance across hybrid cloud environments.

  • Single Vendor Security Access Service Edge (SASE)

    Exponential-e Ltd

    Single-Vendor Secure Access Service Edge (SASE) solutions are tailored for public sector organisations seeking to enhance their network security and operational efficiency. This service integrates essential security functions such as SSL inspection, advanced malware protection, and intrusion prevention with cutting-edge network management technologies, leveraging a cloud-native platform.

  • Rapid7 Insight ThreatCommand

    Armadillo Sec Ltd

    "Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization. Proactively monitoring thousands of sources across the clear, deep, and dark web enables you to rapidly respond to protect your business. Threat Command enables advanced automated response to threat alerts.

  • iProov Remote Onboarding Solution

    iProov Limited

    iProov Remote Onboarding simplifies secure citizen identity verification using face, fingerprint, and/or palm biometrics captured directly via a smartphone or web application. Palm and fingerprint modalities are optional add-ons that can be used individually or in combination with face biometrics.

  • AvePoint Cloud Backup

    Bytes Software Services

    Immutable, Air-Gapped Cloud to Cloud Backups for Microsoft 365, Dynamics 365, Microsoft Azure, Salesforce and Google Workspace bssgc

  • Crowdstrike Falcon Threat Intelligence Licences

    MONDAS CONSULTING LTD

    Purchase Crowdstrike Threat Intelligence licences to utilise the power of the Crowdstrike Falcon Counter Advisory solutions to deliver the latest cyber threat intelligence and active threat hunting. Crowdtstrike’s automated intelligence orchestration and AI powered tool will optimise your entire security stack.

  • Kiteworks

    Kiteworks Europe AG

    Kiteworks comprehensive platform facilitates secure file sharing and collaboration within organisations. Offering features such as document management, secure file transfer, real-time collaboration, workflow automation, SFTP, Enhanced DRM and compliance tools. Users can access, share, and collaborate on files securely across devices, enhancing productivity while ensuring data security and compliance.

  • Sophos Central Intercept X Advanced for Server with XDR and MTR Standard

    INTEGRITY360 LIMITED

    Central Intercept X Advanced for Server with Managed Threat Response (MTR) Standard is for organisations seeking the best protection coupled with the MTR service. Includes all features in Central Intercept X Advanced for Server with XDR plus 24/7 Threat Hunting, Adversarial Detections, Security Health Check, Data Retention, and Activity Reporting.

  • TRUSTMARQUE SOPHOS PRODUCT SUITE

    Trustmarque Solutions Limited

    Powered by threat intelligence, AI and machine learning from SophosLabs and SophosAI, Sophos delivers a broad portfolio of advanced products and services to secure users, networks and endpoints against ransomware, malware, exploits, phishing and the wide range of other cyberattacks. Sophos provides a single integrated cloud-based management console, Sophos Central

  • 2FA messaging

    Boomerang I-Comms Ltd

    Boomerang delivers a robust two-factor authentication (2FA) messaging service, bolstering account security with one-time passcode (OTP) verification. Our solution equips developers with seamless integration tools for heightened protection against unauthorized access. Leveraging Boomerang's platform fortifies accounts, reducing risks and ensuring compliance with ISO 27001, Cyber Essentials, and Cyber Essentials Plus.

  • CDW NetApp Cloud Insights

    CDW Limited

    NetApp Cloud Insights is a monitoring tool that gives you visibility into your complete hybrid cloud infrastructure. With Cloud Insights, you can monitor, troubleshoot and optimize all your resources including your public clouds and your private data centers.

  • Trustmarque Palo Alto Prisma Cloud

    Trustmarque Solutions Limited

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.

  • Brand Trust

    Red Sift Ltd

    Stop brand abuse, fraud, and lookalike attacks by discovering and monitoring lookalike domains imitating your legitimate brand. Automatically discovers known, unknown, and lookalike domains. Provides deep intelligence using WHOIS data, certificate data, web snapshots, DNS signals, and live spam data. Identifies sites abusing your brand with machine-vision powered logo detection.

  • Druva Data Resiliency Cloud - AWS Infrastructure

    Phoenix Software Ltd

    Druva is the only 100%-cloud solution that combines snapshots, backup, and DR at enterprise scale. Simplify snapshot orchestration, reduce storage costs by up to 50%, and protect against ransomware with secure, air-gapped backups isolated from your primary AWS environment..