Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1553 results found

1553 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Computacenter - Palo Alto Cortex XSIAM

    Computacenter (UK) Ltd

    Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents

  • Cyber Warfare Training Platform (Hybrid)

    CYBEXER TECHNOLOGIES

    The platform delivers a private or hybrid cloud-based, scalable cyber warfare simulations, enabling organizations to train in realistic cyber threat environments. This platform offers accessible, cost-effective training solutions that are ideal for enhancing cyber readiness across various sectors through a user-friendly, adaptable training environment.

  • Keyfactor Command

    UNSUNG LIMITED

    Manage & automate digital/TLS certificates in cloud, on-premise & hybrid environments with CA agnostic Keyfactor Command. Discover all of your certificates, public & private, across your enterprise & achieve single screen visibility & control.

  • B-SAFE Secure Data Transfer System

    BONDAP LTD

    B-SAFE Secure data transfer is a web-based system to upload, send and share any files and messages securely and rapidly, including large files and data sets. Secure, Auditable, Automated, and Compliant File, Email and Data Transfer and Sharing. Scalable, and secure with encryption as standard for OFFICIAL and OFFICIAL-SENSITIVE.

  • Varonis SaaS Data Security Platform

    PHOENIX SOFTWARE LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • AvePoint Confide

    SOFTCAT PLC

    Confide for Microsoft 365 When you’re working on high-stakes projects, normal data protections are not enough. So how can you enable internal and external teams to collaborate securely? When everything is on the line, trust in Confide

  • MTI- Cyber Security

    MTI TECHNOLOGY LIMITED

    MTI understand the pace at which data and information is growing, and are able to provide the critical, flexible infrastructure information services required to manage the data collected. Our expertise can help organisations within the information service industry to adapt their strategy to meet the market demand they currently face.

  • Quest On-Demand

    BYTES SOFTWARE SERVICES LIMITED

    A secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard. bssgc

  • Tessian ICES

    SOFTCAT PLC

    Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • SEP2.security Endpoint Detection & Response (EDR)

    SEP2 LIMITED

    SEP2.security EDR is a managed Endpoint Detection & Response service powered by the Crowdstrike Falcon suite. Delivered by our "eyes on" 24/7/365 SOC team based in Leeds, West Yorkshire, SEP2.security EDR provides the technology and service to deliver the best Endpoint security.

  • Nexus Dark Web Monitoring & Reporting Service

    NEXUS OPEN SYSTEMS LIMITED

    Digital credentials including usernames and passwords connect your employees to critical business systems and applications, along with other online services. Compromised credentials are amongst the most valuable assets found on the Dark Web. Nexus Dark Web Monitoring and Reporting delivers real-time awareness of compromised credentials and remedial correction.

  • Ultima AvePoint MyHub for Microsoft 365

    ULTIMA BUSINESS SOLUTIONS LTD.

    Track Teams, Sites, Groups and Communities in Microsoft Office 365? We get it. Time spent searching means less time being productive. Meet MyHub, your one-stop-shop for managing existing Microsoft 365 workspaces and creating new ones—all from Microsoft Teams or our handy web app! Organize, understand, and centrally access your assets.

  • Active Wolf Managed Security Platform

    XTRAVIRT LIMITED

    Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.

  • Sophos Intercept X Advanced

    SOFTCAT PLC

    Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.

  • Centerprise Web Filtering Service by TitanHQ

    CENTERPRISE INTERNATIONAL LIMITED

    WebTitan is a cloud based web filtering service which allows you to monitor, control, protect and report on your business and users from online threats. You can create a granular policy for your users to control internet access and block malware in your organisation.

  • Logically Intelligence

    THELOGICALLY LTD

    A threat intelligence platform that brings together Logically’s capabilities in at-scale analysis, classification and detection to help governments and organisations monitor the online media landscape for the spread of damaging activity and narratives. This includes Crisis Response, Election Integrity, Misinformation, Disinformation, On-line Harms and Influence Operations.

  • CrowdStrike Falcon Cloud Security

    SOFTCAT PLC

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • Netwrix Privilege Secure

    INTEGRITY360 LIMITED

    Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance.

  • CDW CrowdStrike Falcon Next Gen SIEM

    CDW LIMITED

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Rubrik Cloud Data Management, Backup and Recovery

    Khipu Networks Limited

    Rubrik provides a zero-trust data protection platform across all data and applications whether it be located on premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery, Incident containment and Orchestrated Application Recovery all within a single management plane.

  • Sophos Intercept X Advanced with X/MDR

    INTEGRITY360 LIMITED

    Sophos Intercept X is the industry’s only X/MDR solution that synchronizes native endpoint, server, firewall, email, cloud, and O365 security. Get a holistic view of your organization’s environment with the richest data set and deep analysis for threat detection, investigation, and response for both dedicated SOC teams and IT admins.

  • boxxe Tenable Unified CNAPP and CIEM software

    BOXXE LIMITED

    See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.

  • Cloudlake Backup for Google Workspace (G Suite)

    AUTODATA PRODUCTS LIMITED

    Cloudlake Backup for Google Workspace (G Suite) protects your data from undetected deletions, corruption, and both internal and external threats. Our unique model allows you to protect, Gmail, Drive, Contacts, Calendar and Shared Drives against any event, whilst ensuring you only purchase exactly what you require with no wasted expense.

  • Tenable PCI-ASV

    BYTES SOFTWARE SERVICES LIMITED

    Tenable PCI ASV allows you to take an unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organization complies with PCI DSS. bssgc

  • Digital IoT Tracking and Resource Management

    ishelp.co.uk Ltd

    ISHelp provides a secure Internet of Things (IoT) Cloud/ICT system service via a secure digital system for the management, tracking and conditional monitoring of assets and equipment. The secure digital system delivered via a common operating picture approach provides operational understanding to enable effective decision making.

  • Cisco Umbrella Cloud Service

    QUADRIS LIMITED

    Cisco Umbrella secures your users internet access and controls cloud application usage across networks, branch offices, and roaming users. Cisco Umbrella delivers DNS-layer security, secure web gateway and firewall protection all delivered from a single cloud security service. The platform provides rapid protection to reduce phishing, malware and ransomware threats.

  • MTI Trend Micro Vision One

    MTI TECHNOLOGY LIMITED

    Cloud-native security operations platform, service cloud, hybrid, and on-premises environments, combines attack surface management (ASM) and extended detection and response (XDR) in one console to manage organisational cyber risk. Trend Micro Cloud One (Security, Conformity, Cloud Storage), Micro Network One (Discovery Inspector, Micro Workforce One (Smart Protection Complete), Micro XDR

  • Prisma Access

    LRQA

    Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.

  • Cylance - End Point AI Enabled Anti Virus Protection

    Grove Information Systems

    Cylance leverages AI to detect and prevent malware from executing in real time. By taking a mathematical approach to malware identification utilising patent-pending, machine learning techniques instead of reactive signatures and sandboxes, Cylance renders new malware, viruses, bots, and unknown future variants useless.

  • Check Point Harmony Browse

    INTEGRITY360 LIMITED

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.