Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1691 results found

1691 results found in Lot 2: Cloud software in the category Security risk management

  • CyberArk Workforce Identity

    Bytes Software Services

    CyberArk workforce Identity is an IDaaS that offers full featured identity lifecycle & access management; it includes adaptive MFA/SSO and unique extra controls such as a Password Manager, adaptive Workstation MFA, Secure Browser and Web session protection . bssgc

  • Computacenter - F5 Distributed Cloud DDoS Mitigation (formerly Silverline DDoS Protection)

    Computacenter (UK) Ltd

    Cloud-delivered DDoS protection that detects and mitigates attacks before they reach your network infrastructure.

  • CDW BlueVoyant - Supply Chain Defence Cyber Risk Management (SCD)

    CDW Limited

    We help government organisations obtain clear visibility into cybersecurity risks across their supply chain by proactively identifying, prioritising and remediating cyber risks posed by business partners and supply chain relationships.

  • Sophos Zero Trust Network Access (ZTNA)

    Softcat Limited

    Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users.

  • CDW AWS Marketplace - BYOL

    CDW Limited

    AWS Marketplace is a curated digital catalogue that makes it easy for Buyers to find, buy, deploy, and manage third-party software, AI/ML models and algorithms and the data sets they need to build solutions and run their organisations. The service available on GCloud 12 is ‘Bring Your Own Licence’ (BYOL).

  • Qualys Software Licensing and Renewals

    Cloud 21 Limited

    Delivering our focused cyber security services to the NHS and healthcare, we work in partnership with Qualys to offer licensing, renewals, initial discovery/readiness, solution design, migration/adoption, support/optimisation and management of their Qualys VMDR software, including licensing consultancy services to help our clients get the most from their Qualys deployment.

  • Regulatory Compliance

    DAVIES GROUP LIMITED

    The Regulatory Compliance proposition from Davies Technology Solutions are a number of templated modules within a platform which delivers Training and Competence monitoring, Quality Assurance processes and Complaints Management processes. The solution is delivered as a service from a scalable and secure hosted private cloud based Environment.

  • Cloudbooking - Car Parking Booking

    Cloudbooking.com

    Cloudbooking Workspace Management solution brings together people, place and technology, in the new hybrid world of work. Increase the efficiency of your workforce, real estate and car parking spaces, as well as improve your visitor experience with Cloudbooking Car Park Management Solution.

  • Check Point Harmony Browse

    Softcat Limited

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.

  • Check Point Harmony Mobile

    NETWORK INTEGRATION TECHNOLOGIES LTD

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • boxxe Tenable External Attack Surface Management

    BOXXE LIMITED

    Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk.

  • IBM Guardium on Cloud

    Responsiv Solutions Ltd

    The IBM Security Guardium for Marketplaces offering delivers an advanced data security solution based on the IBM Security Guardium Data Protection product. It allows Clients to automatically discover and classify sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behaviour analytics.

  • Consulting Services

    AVORD Limited

    A powerful client based platform that provides the management of time and costs across a wide range of consultancy, including security, operations and strategy. Examples include penetration testing, compliance certifications, Operational Technology (OT), 24x7 365 SOC Services.

  • Tenable Web App Scanning

    INTEGRITY360 LIMITED

    Simple, scalable and automated vulnerability scanning for web applications.

  • MetaPolicy

    MetaCompliance Ltd

    MetaPolicy enables organisations to automate and manage the key tasks associated with policy management. With MetaPolicy, organisations can increase policy participation, easily obtain employee attestation to key policies, and embed a culture of compliance.

  • Broadcom/Symantec Web Protection Suite

    Gradian Systems Ltd

    Symantec WPS gives organizations an advanced cloud-delivered Secure Web Gateway and leading on-premise SWG deployment—both of which can operate seamlessly together with a unified management, reporting, and policy control interface. It also includes Threat Intelligence, SSL Inspection, Content Analysis, Isolation, Sandboxing, WAF, and more.

  • Computacenter - ProofPoint Tessian DLP

    Computacenter (UK) Ltd

    Adaptive Email DLP uses behavioural-AI to learn about employees’ normal email sending behaviours, their trusted relationships and how they communicate sensitive data. It then analyses each email to detect anomalous behaviour, notifying admins of potential incidents. And it warns the user in real time, preventing sensitive data loss through email.

  • Abnormal Email Security

    Gradian Systems Ltd

    Abnormal provides unprecedented protection against attacks that target human behaviour, including socially-engineered threats, vendor fraud, and cloud account takeovers. This approach stops 70% more attacks than SEGs, including payloadless emails, which made up 24% of all blocked attacks in 2023.

  • Crowdstrike Falcon Security Platfrom

    BlueFort Security Ltd

    CrowdStrike secures critical areas of risk, endpoints, cloud workloads, identity and data to keep ahead of adversaries and stop breaches. CrowdStrike's Security platform leverages real-time indicators of attack, threat intelligence and enriched telemetry to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities

  • Policy management software (Insight4GRC 4policies)

    RSM UK RISK ASSURANCE SERVICES LLP

    Policy management software manages the dissemination of policies and procedures to employees. Our policy management software enables employees understanding to be tested and their acceptance of policies recorded. Interactive dashboards provide a real time overview of the status of policy acceptance across an organisation. A comprehensive report engine outputs information.

  • Microsoft Online Services and Agreements

    Bytes Software Services

    Select your tailored Microsoft agreement from the complete range of Microsoft online services and software. bssgc

  • Governance, risk management and compliance software (Insight4GRC)

    RSM UK RISK ASSURANCE SERVICES LLP

    Governance Risk and Compliance (GRC) software from RSM. Insight4GRC is a cost-effective governance, risk and compliance software suite that designed to strengthen an organisations GRC arrangements through a highly configurable tool for the management of risk, control, assurance/compliance, action, policy and performance.

  • Delinea Platform - Privileged & Identity Access Management (PIM & PAM)

    Softcat Limited

    Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.

  • Palo Alto Cortex Xpanse

    Charterhouse Voice & Data

    Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services. Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.

  • CDW Check Point CloudGuard Web Application Firewall (WAFaaS)

    CDW Limited

    Check Point CloudGuard WAF provides Web Application and API protection. With deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security.

  • XM Cyber Attack Path Management

    Softcat Limited

    The XM Cyber platform continuosly and safely runs attack simulations across Hybrid Cloud environments, identifying misconfigurations, vulnerabilities, lack of segmentation, over permissioned users and user beaviour that can allow an attacker to laterally move and compromise critical assets. XM Cyber prioritises the issues/devices/accounts that put the critical assets at risk,

  • ForeScout EyeSight/EyeControl/EyeInspect

    INTEGRITY360 LIMITED

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assests.

  • Micro Focus, now OpenText - OpScope on SaaS

    MICRO FOCUS

    OpScope is a native cloud application that delivers a unified application and service status view for cloud and on-premises infrastructure. It provides essential and advanced cloud monitoring, discovery of services, collection of metrics, out-of-the-box thresholds that generate events, a set of out-of-the-box performance dashboards, reports, subject matter expert troubleshooting workflows.

  • Palo Alto Cortex Xpanse

    Softcat Limited

    Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services. Cortex XPanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.

  • CyberArk Secure Cloud Access

    INTEGRITY360 LIMITED

    The CyberArk-Identity-Security-Platform provides controls to secure access to every layer of a cloud-environment-from cloud-native services to dynamic-workloads running on the cloud to lift-and-shift-workloads and SaaS-applications. CyberArk-Secure-Cloud-Access provides Just-in-time(JIT) access with Zero-Standing-Privileges. The solution analyzes cloud-entitlements and offers an Insight-to-Action framework to accelerate risk-reduction and time-to-value through migration to safer access-policies.