Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1553 results found

1553 results found in Lot 2: Cloud software in the category Secure content and threat management

  • MTI Palo Alto Networks

    MTI TECHNOLOGY LIMITED

    (Palo Alto Networks Cortex XSOAR), (Palo Alto Networks Cortex XDR), (Palo Alto Networks Prisma Cloud), (Palo Alto Networks Prisma SaaS), (Palo Alto Networks VM-Series Next-Generation Firewalls). Palo Alto Networks offers an enterprise cybersecurity platform which provides network security, cloud security, endpoint protection, and various cloud-delivered security services.

  • Crowdstrike Falcon Next gen SIEM Licences

    MONDAS CONSULTING LTD

    Purchase Crowdstrike Next Gen SIEM licences to utilise the power of Crowdstrike to collate log data from all of your security stack and generate alarms for a SOC team to triage. Crowdstrike Next Gen SIEM can remediate these alarms using powerful automated playbook actions.

  • Tessian ICES

    INTEGRITY360 LIMITED

    Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • Micro Focus, now OpenText - OpenText Core IAM Foundation on SaaS

    MICRO FOCUS

    OpenText Core IAM Foundation provides essential Identity and Access Management capabilities that organizations need to support a secure IAM program. The OpenText Core IAM Foundation provides: • Identity Governance • Advanced Authentication Limited – a Multi-Factor Authentication (MFA) framework • Password Management • Identity Intelligence Basic

  • Logpoint Converged SIEM and SOAR

    ARMADILLO SEC LTD

    Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. Providing a comprehensive and centralised view of the security posture of an IT infrastructure.

  • CDW AvePoint EnPower for Microsoft 365

    CDW LIMITED

    As appetites continue to grow to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft365. AvePoint EnPower equips IT teams to pivot as needs and requirements change without worrying about what model makes sense in that moment.

  • Egress Defend - Integrated Cloud Email Security

    S3 Ltd

    Egress Defend is Intelligent Cloud Email Security. It protects against data breaches by reducing human activated risk. Intelligent technologies using AI detect sophisticated phishing attacks, including BEC compromise and account takeover and engage users with contextual, colour-coded warnings embedded in suspicious emails.

  • Human Risk Management & Mitigation, Phishing Simulation, Security Awareness Training & DMARC

    Lloyds Ventures

    HumanFirewall measures, manages and mitigates risk at the Human Layer. Platform uses automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks. EmailAuth enables Brand-Protection, Anti-Spoofing and Enhances Email-Deliverability using DMARC, SPF, DKIM, MTA-STS, TLS-RPT & BIMI.

  • Armour Unity - Ultra Secure Video Conferencing for Sensitive & Higher Assurance Environments

    Armour Comms

    Secure enterprise video conferencing, screen sharing and in-app messaging for iOS/ Android devices. Documents and chats associated with conference call benefit from the trusted security of the Armour mobile platform. Unity uses MIKEY-SAKKE IBE. Participants on a call can be certain that only other invited attendees can join the conference.

  • Tenable PCI-ASV

    PHOENIX SOFTWARE LIMITED

    Unlimited comprehensive scans identify and address vulnerabilities, ensuring PCI DSS compliance. The Tenable PCI ASV process follows strict guidelines, preventing vulnerabilities on payment card transaction networks for more than 90 days. This user guide assists with navigating the entire Tenable PCI ASV process

  • Check Point CloudGuard Web Application Firewall as a Service (WAFaaS)

    SOFTCAT PLC

    Web Application and API protection. With deep application contextual analysis, eliminates the trade-off between level of security and complexity of managing application security. Whether application is hosted in data centre or in a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks, blocks automated attacks (Bots)

  • IBM Watson Query

    IBM UNITED KINGDOM LIMITED

    IBM Watson Query allows you to query data across many systems without having to copy and replicate it, saving time and reducing costs. Watson Query queries data from its source, simplifying your analytics by providing the latest and most accurate data.

  • Palo Alto Networks Cortex XSOAR

    Khipu Networks Limited

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • Microsoft 365 Licensing

    HOWELL TECHNOLOGY GROUP LIMITED

    Office 365 and Microsoft 365 Apps enables you to create, share, and collaborate from anywhere on any device with a cloud-based suite of productivity apps and services. Licensing available from Microsoft 365 Apps for enterprise, O/M365 E1, O/M365 E3 and O/M365 E5.

  • Security Operations for CryptoSpike as a service

    Proact IT UK Limited

    Proact’s Security Operations for CryptoSpike is a fully managed service offered to improve customers’ ransomware protection on NetApp servers being used to serve NAS based file content. The service delivers the following capabilities and features:

  • Maxcourse

    MAXINITY SOFTWARE LIMITED

    Maxcourse is a complete course booking and management system which both simplifies your course administration and makes it more effective. Set up, manage and publish healthcare (CPD) courses in one place. This includes secure online booking for delegates, post-course evaluation and downloading of certificates.

  • CDW CrowdStrike Falcon Cloud Security

    CDW LIMITED

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • Barrier Networks Crowdstrike Falcon Identity Threat Detection & Protection

    Barrier Networks

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • Cisco Umbrella

    NOC365 LTD

    Cisco Umbrella is used as the first layer defense for security against threats before they happen. Our Managed Cisco Umbrella service works at the DNS layer to protect all devices connected to a network, both on and off the corporate network.

  • Proofpoint Insider Threat Management

    INTEGRITY360 LIMITED

    Proofpoint Insider Threat Management(ITM) takes a people-centric approach to protect against data loss, malicious acts and brand damage involving insiders. We defend against authorised-users acting maliciously, negligently, unknowingly. We correlate user-activity and data-movement to protect you from insider-led data-breaches. We detect risky behaviour in real-time to give evidence of wrongdoing.

  • ServiceNow (ITSM/ITOM/CSM) - Fitness Check by SCC

    SPECIALIST COMPUTER CENTRES PLC

    SCC has a growing track record of delivering IMPACT to existing ServiceNow (ITSM/ITOM/CSM) customers via our tried and tested Fitness Check solution. Over customised environment? Not getting the benefit from ServiceNow’s family releases? Struggling to deliver ROI? Allow SCC to health check your Service Desk environment solving your issues

  • Computacenter - Trend Micro One

    Computacenter (UK) Ltd

    Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location.

  • Dev-ops Consulting Services

    VE3 GLOBAL LTD

    Our DevOps consulting services help organizations integrate their development and operations teams through the adoption of cloud-native technologies that streamline and automate their workloads. The result is a fast, secure and flexible enterprise that can adapt to changing market by leveraging efficient and continuous delivery, reduced complexity and reusable workloads.

  • Centerprise Email Spam Filtering by TitanHQ

    CENTERPRISE INTERNATIONAL LIMITED

    SpamTitan Cloud is a full-service, cloud based email security solution which protects your business, your employees and your clients. The cloud solution is simple to set up and manage, requires no software installation and provides 99.7% spam detection, virus and malware blocking, authentication control, outbound scanning and robust reporting structures.

  • KnowBe4 PhishER

    NETWORK INTEGRATION TECHNOLOGIES LTD

    PhishER is a light-weight SOAR platform that automatically analyses and prioritises reported email messages to identify and quarantine malicious email across your organisation. Additionally, transforms in-the-wild phishing emails into training opportunities by flipping them into simulated phishing campaigns.

  • Computacenter - Harness Software Delivery Platform

    Computacenter (UK) Ltd

    Harness Software Delivery-Platform modernizes DevOps, enhances Developer Experience, secures Software Delivery, and optimizes Cloud Costs. Our suite includes Code Repository, CI/CD, GitOps, Feature Flags, Infrastructure as Code, Chaos Engineering, Service Reliability, Developer Portal, Engineering Insights, Supply Chain Assurance, Security Testing, and Cloud Cost Management, enabling end-to-end Software Delivery Lifecycle transformation.

  • boxxe Sophos Intercept X Advanced

    BOXXE LIMITED

    Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.

  • CrowdStrike Falcon Next Generation SIEM

    BT PLC

    CrowdStrike Falcon Next-Gen SIEM revolutionises threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Cybereason EDR Licences

    MONDAS CONSULTING LTD

    Purchase Cybereason EDR licences to utilise the power of the Cybereason Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Cybereason EDR for signs of malicious activity on your network.

  • Check Point CloudGuard Network Security (CGNS)

    INTEGRITY360 LIMITED

    CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.