Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Microsoft 365 Licensing

    HOWELL TECHNOLOGY GROUP LIMITED

    Office 365 and Microsoft 365 Apps enables you to create, share, and collaborate from anywhere on any device with a cloud-based suite of productivity apps and services. Licensing available from Microsoft 365 Apps for enterprise, O/M365 E1, O/M365 E3 and O/M365 E5.

  • Security Operations for CryptoSpike as a service

    PROACT IT UK LIMITED

    Proact’s Security Operations for CryptoSpike is a fully managed service offered to improve customers’ ransomware protection on NetApp servers being used to serve NAS based file content. The service delivers the following capabilities and features:

  • Maxcourse

    Maxinity

    Maxcourse is a complete course booking and management system which both simplifies your course administration and makes it more effective. Set up, manage and publish healthcare (CPD) courses in one place. This includes secure online booking for delegates, post-course evaluation and downloading of certificates.

  • CDW CrowdStrike Falcon Cloud Security

    CDW LIMITED

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • Barrier Networks Crowdstrike Falcon Identity Threat Detection & Protection

    BARRIER NETWORKS LIMITED

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • Cisco Umbrella

    NOC365 LTD

    Cisco Umbrella is used as the first layer defense for security against threats before they happen. Our Managed Cisco Umbrella service works at the DNS layer to protect all devices connected to a network, both on and off the corporate network.

  • Proofpoint Insider Threat Management

    INTEGRITY360 LIMITED

    Proofpoint Insider Threat Management(ITM) takes a people-centric approach to protect against data loss, malicious acts and brand damage involving insiders. We defend against authorised-users acting maliciously, negligently, unknowingly. We correlate user-activity and data-movement to protect you from insider-led data-breaches. We detect risky behaviour in real-time to give evidence of wrongdoing.

  • ServiceNow (ITSM/ITOM/CSM) - Fitness Check by SCC

    SPECIALIST COMPUTER CENTRES PLC

    SCC has a growing track record of delivering IMPACT to existing ServiceNow (ITSM/ITOM/CSM) customers via our tried and tested Fitness Check solution. Over customised environment? Not getting the benefit from ServiceNow’s family releases? Struggling to deliver ROI? Allow SCC to health check your Service Desk environment solving your issues

  • Computacenter - Trend Micro One

    COMPUTACENTER (UK) LIMITED

    Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location.

  • Dev-ops Consulting Services

    VE3 GLOBAL LTD

    Our DevOps consulting services help organizations integrate their development and operations teams through the adoption of cloud-native technologies that streamline and automate their workloads. The result is a fast, secure and flexible enterprise that can adapt to changing market by leveraging efficient and continuous delivery, reduced complexity and reusable workloads.

  • Centerprise Email Spam Filtering by TitanHQ

    CENTERPRISE INTERNATIONAL LIMITED

    SpamTitan Cloud is a full-service, cloud based email security solution which protects your business, your employees and your clients. The cloud solution is simple to set up and manage, requires no software installation and provides 99.7% spam detection, virus and malware blocking, authentication control, outbound scanning and robust reporting structures.

  • KnowBe4 PhishER

    ITogether

    PhishER is a light-weight SOAR platform that automatically analyses and prioritises reported email messages to identify and quarantine malicious email across your organisation. Additionally, transforms in-the-wild phishing emails into training opportunities by flipping them into simulated phishing campaigns.

  • Computacenter - Harness Software Delivery Platform

    COMPUTACENTER (UK) LIMITED

    Harness Software Delivery-Platform modernizes DevOps, enhances Developer Experience, secures Software Delivery, and optimizes Cloud Costs. Our suite includes Code Repository, CI/CD, GitOps, Feature Flags, Infrastructure as Code, Chaos Engineering, Service Reliability, Developer Portal, Engineering Insights, Supply Chain Assurance, Security Testing, and Cloud Cost Management, enabling end-to-end Software Delivery Lifecycle transformation.

  • boxxe Sophos Intercept X Advanced

    BOXXE LIMITED

    Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.

  • CrowdStrike Falcon Next Generation SIEM

    BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY

    CrowdStrike Falcon Next-Gen SIEM revolutionises threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Cybereason EDR Licences

    MONDAS CONSULTING LTD

    Purchase Cybereason EDR licences to utilise the power of the Cybereason Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Cybereason EDR for signs of malicious activity on your network.

  • Check Point CloudGuard Network Security (CGNS)

    INTEGRITY360 LIMITED

    CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.

  • Computacenter - Palo Alto Cortex XSIAM

    COMPUTACENTER (UK) LIMITED

    Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents

  • Cyber Warfare Training Platform (Hybrid)

    CYBEXER (UK) LTD

    The platform delivers a private or hybrid cloud-based, scalable cyber warfare simulations, enabling organizations to train in realistic cyber threat environments. This platform offers accessible, cost-effective training solutions that are ideal for enhancing cyber readiness across various sectors through a user-friendly, adaptable training environment.

  • Keyfactor Command

    UNSUNG LIMITED

    Manage & automate digital/TLS certificates in cloud, on-premise & hybrid environments with CA agnostic Keyfactor Command. Discover all of your certificates, public & private, across your enterprise & achieve single screen visibility & control.

  • B-SAFE Secure Data Transfer System

    BONDAP LTD

    B-SAFE Secure data transfer is a web-based system to upload, send and share any files and messages securely and rapidly, including large files and data sets. Secure, Auditable, Automated, and Compliant File, Email and Data Transfer and Sharing. Scalable, and secure with encryption as standard for OFFICIAL and OFFICIAL-SENSITIVE.

  • Varonis SaaS Data Security Platform

    PHOENIX SOFTWARE LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • AvePoint Confide

    SOFTCAT PLC

    Confide for Microsoft 365 When you’re working on high-stakes projects, normal data protections are not enough. So how can you enable internal and external teams to collaborate securely? When everything is on the line, trust in Confide

  • MTI- Cyber Security

    MTI TECHNOLOGY LIMITED

    MTI understand the pace at which data and information is growing, and are able to provide the critical, flexible infrastructure information services required to manage the data collected. Our expertise can help organisations within the information service industry to adapt their strategy to meet the market demand they currently face.

  • Quest On-Demand

    BYTES SOFTWARE SERVICES LIMITED

    A secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard. bssgc

  • Tessian ICES

    SOFTCAT PLC

    Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • SEP2.security Endpoint Detection & Response (EDR)

    SEP2 LIMITED

    SEP2.security EDR is a managed Endpoint Detection & Response service powered by the Crowdstrike Falcon suite. Delivered by our "eyes on" 24/7/365 SOC team based in Leeds, West Yorkshire, SEP2.security EDR provides the technology and service to deliver the best Endpoint security.

  • Nexus Dark Web Monitoring & Reporting Service

    NEXUS OPEN SYSTEMS LIMITED

    Digital credentials including usernames and passwords connect your employees to critical business systems and applications, along with other online services. Compromised credentials are amongst the most valuable assets found on the Dark Web. Nexus Dark Web Monitoring and Reporting delivers real-time awareness of compromised credentials and remedial correction.

  • Ultima AvePoint MyHub for Microsoft 365

    ULTIMA BUSINESS SOLUTIONS LTD.

    Track Teams, Sites, Groups and Communities in Microsoft Office 365? We get it. Time spent searching means less time being productive. Meet MyHub, your one-stop-shop for managing existing Microsoft 365 workspaces and creating new ones—all from Microsoft Teams or our handy web app! Organize, understand, and centrally access your assets.

  • Active Wolf Managed Security Platform

    XTRAVIRT LIMITED

    Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.