Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2446 results found

2446 results found in Lot 2: Cloud software in the category Security

  • ISMS Online

    TechForce Cyber

    An online secure information security (ISMS), privacy (PIMS), business continuity (BSMS), quality (QMS) and AI (AIMS)management system with tools, policies and frameworks. To meet governance, regulatory, compliance of internal ISMS/ IMS and supply chain collaboration for ISO 27001, ISO 27701, ISO 22301, GDPR, ISO 9001, ISO 42001 (and more), including;

  • Cycognito Attack Surface Management

    BLUEFORT SECURITY LIMITED

    SaaS platform providing the External Attack Surface Management while automating attacker techniques. Testing and protecting organisations through delivering continuous attack surface visibility, discovering and prioritising cyber risk, guiding and accelerating risk mitigation

  • Decommissioning as a service (DaaS) On-site Data Bearing Media Destruction

    NETWORK 2 SUPPLIES LIMITED

    Data destruction and disposal/recycling of legacy equipment is central to managing a system migration to Cloud. N2S offer onsite data destruction for hardware. Certificates listing hard drive serial numbers as proof of destruction are provided. All resultant waste will be disposed of in-line with the WEEE regulations.

  • Check Point Harmony Email and Collaboration

    ITogether

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • Security Detection and Visibility (SIEMaaS) as a service

    PROACT IT UK LIMITED

    Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support. The service provides remote collection and analysis of logs, using a leading public cloud hosted Security Information and Event Management solution

  • UK Engage Secure online meetings with voting

    PIN Communications

    Our secure online meetings with voting solution is used for online and hybrid meetings. It’s easy to use and flexible. With advanced voter authentication or single sign on. It manages proxy voting and live in meeting voting processes, and can be branded with client’s logo, colour scheme and imagery.

  • Agile - Product Owner and Training

    I-NET SOFTWARE SOLUTIONS LTD

    This 2 day training for product owners and stake holders help in understand agile software development and importance of their value to the project. This training also covers the GDS standards and importance of it so that they will ensure the development team is adhere them

  • Backup, and Disaster Recovery Services with DATTO

    TECHNOLOGY SERVICES GROUP LIMITED

    TSG and Datto provides an industry-leading hybrid on-premise & cloud backup & DR solution. This technology provides localised granular data backup and recovery, with a secondary cloud backup. This allows you to locally recover servers on the appliance or to recover your servers in the Datto cloud in a disaster.

  • Penetration Testing Solution

    GET SWARMS LIMITED

    Penetration Testing Solution offered by Get Swarms provides comprehensive assessments to bolster organisation security. By simulating real-world cyber-attacks, we uncover vulnerabilities in networks and applications, enabling proactive defense measures. Detailed reports are produced together with proposed remediations to support ongoing cyber defence strategy.

  • Qualys Vulnerability Scanning

    ZENZERO SOLUTIONS LIMITED

    Comprehensive vulnerability scanning including internal, external, network, application, compliance and agent-based scanning. Powered by Qualys, our scanning provides continuous assurance, identifies potential security weaknesses and threats across assets and provide actionable remediation advice.

  • CDW Sophos Managed Detection and Response Complete (MDR) Server

    CDW LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Agile Tooling Assessment and Implementation (e.g., Jira, Trello)

    LEFKE IT LIMITED

    LefkeIT specializes in Agile Tooling Assessment and Implementation for Government Departments. Our expert consultants assess needs and recommend and deploy the most suitable Agile tools like Jira or Trello. With tailored setups, we enhance collaboration and efficiency. Trust us for reliable Agile Tooling solutions that optimize project management.

  • Proofpoint Archive

    BYTES SOFTWARE SERVICES LIMITED

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house. bssgc

  • Barracuda 24X7 O365 Detection & Response

    Glemnet Ltd

    Office 365 Security Monitoring is a managed security product that monitors Office 365 activity using analytics platform, Security Information and Event Management, threat intelligence and 27/7/365 Security Operations Centre.Identification of threat-like behavior such as unauthorized access to cloud mailboxes, admin changes in the environment, impossible logins and brute force attacks.

  • Netwrix Privilege Secure

    BYTES SOFTWARE SERVICES LIMITED

    Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance. bssgc

  • Sophos Firewall

    PHOENIX SOFTWARE LIMITED

    XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Adepsi Legacy Call and Cloud Telephony Platform by SVL

    SVL BUSINESS SOLUTIONS LIMITED

    Adepsi is a legacy data solution that imports and stores audio and meta-data from various different voice recording platforms, providing replay functionality on a simplified, supportable platform running on a highly resilient AWS infrastructure. Once imported, the source legacy platform can be decommissioned and all data is safe and searchable.

  • Change Management and Impact Assessment

    LEFKE IT LIMITED

    LefkeIT specializes in Change Management and Impact Assessment. Our expert team evaluates proposed changes thoroughly, identifying potential impacts on processes, systems, and stakeholders. Through strategic planning and stakeholder engagement, we minimize disruptions and ensure smooth transitions, maximizing the success of change initiatives. Trust us to navigate change effectively.

  • Shadow Data Security Posture Management Monitoring

    DIEGESIS LIMITED

    Guardium Insights DSPM allows you uncover hidden data, analyse data flows and identify data security vulnerabilities. Get a 360 degree view of all your sensitive data in cloud by discovering shadow data, analysing flow of data and uncovering posture vulnerabilities.

  • Cisco Secure Access Service Edge (SASE)

    SOFTCAT PLC

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • boxxe Mimecast Cyber Resilience Pro Plan

    BOXXE LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Managed SSE Services (Secure Service Edge)

    XALIENT HOLDINGS LIMITED

    By providing secure access to the internet, cloud services, and private apps regardless of the user's location, SSE is a single-vendor, cloud-centric integrated solution that speeds up digital transformation. Threat detection and response, platform support, and setup are all included in the service. Xalient utilises: Netscope, HPE Aruba, and Zscaler.

  • Darktrace Active AI Security Platform

    BYTES SOFTWARE SERVICES LIMITED

    World-leading cyber-threat detection and real-time visibility in the Cloud. Compatible with all major Cloud providers (including AWS, Google Cloud and Microsoft Azure). The service uses self-learning technology to detect threats and anomalous behaviours. Fully configurable, it allows organisations to monitor all or selected Cloud traffic, with minimal performance impact. bssgc

  • Varonis SaaS Data Security Platform

    CM SECURITY LTD

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • SecurityRating.com: Third Party Risk & Vendor Risk Management + Attack Surface Management Platform

    Infosec Ventures

    SecurityRating.com: See your attack surface and third-party (vendor) risk with unrivalled clarity. Reduce your team’s workload with automation. Continuously monitor IT infrastructure. Get insights into vulnerabilities and threats, helping organisations manage risk and comply with regulations. Third-Party & Supply Chain Risk & Attack Surface Management made easy. Finally.

  • Workspace ONE Assist

    PHOENIX SOFTWARE LIMITED

    VMware Workspace ONE Assist is a real-time remote support solution that enables IT and help desk staff to quickly assist employees with mobile and laptop device tasks or issues, decreasing downtime, maximizing productivity, and improving the overall employee experience.

  • Gov360 OpenSky : Enterprise Data & AI - Data Governance & Security (DGSaaS) - Purview

    OpenSky Data Systems

    OpenSky's "Data Governance & Security as a Service" leverages Microsoft Purview to provide comprehensive data protection, governance, and compliance across your multicloud and hybrid data estate. Our experts help you discover, understand, and secure your data, mitigate risks, and simplify compliance through a unified, AI-powered platform.

  • MTI SOC and SIEM Managed Service

    MTI TECHNOLOGY LIMITED

    MTI’s Managed SIEM / SOC platform applies industry-leading technologies. Asset Discovery/Management, Vulnerability and Patch Scanning, SIEM Logging/Correlation/Alerting, Intrusion Detection, Automated Incident Response/Defence, User Behaviour Analytics, Threat Intelligence, Full Cloud Integration, Custom Dashboards/Playbooks, Service Desk alerting/ticketing, XDR, MDR, MXDR, 24x7, Defender, Sentinel, SC-Cleared UK-based NCSC cyber experts. Threat Simulation Exercises.

  • Risk Based Vulnerability Management

    GAMMA NETWORK SOLUTIONS LIMITED

    Identify and prioritise vulnerabilities based on risk to your business. Managed in the cloud.

  • Tenable One - Standard

    BYTES SOFTWARE SERVICES LIMITED

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance. Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory bssgc