Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Sophos Intercept X Advanced

    SOFTCAT PLC

    Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.

  • Centerprise Web Filtering Service by TitanHQ

    CENTERPRISE INTERNATIONAL LIMITED

    WebTitan is a cloud based web filtering service which allows you to monitor, control, protect and report on your business and users from online threats. You can create a granular policy for your users to control internet access and block malware in your organisation.

  • CrowdStrike Falcon Cloud Security

    SOFTCAT PLC

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • Netwrix Privilege Secure

    INTEGRITY360 LIMITED

    Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance.

  • CDW CrowdStrike Falcon Next Gen SIEM

    CDW LIMITED

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Rubrik Cloud Data Management, Backup and Recovery

    KHIPU NETWORKS LIMITED

    Rubrik provides a zero-trust data protection platform across all data and applications whether it be located on premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery, Incident containment and Orchestrated Application Recovery all within a single management plane.

  • Sophos Intercept X Advanced with X/MDR

    INTEGRITY360 LIMITED

    Sophos Intercept X is the industry’s only X/MDR solution that synchronizes native endpoint, server, firewall, email, cloud, and O365 security. Get a holistic view of your organization’s environment with the richest data set and deep analysis for threat detection, investigation, and response for both dedicated SOC teams and IT admins.

  • boxxe Tenable Unified CNAPP and CIEM software

    BOXXE LIMITED

    See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.

  • Cloudlake Backup for Google Workspace (G Suite)

    AUTODATA PRODUCTS LIMITED

    Cloudlake Backup for Google Workspace (G Suite) protects your data from undetected deletions, corruption, and both internal and external threats. Our unique model allows you to protect, Gmail, Drive, Contacts, Calendar and Shared Drives against any event, whilst ensuring you only purchase exactly what you require with no wasted expense.

  • Tenable PCI-ASV

    BYTES SOFTWARE SERVICES LIMITED

    Tenable PCI ASV allows you to take an unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organization complies with PCI DSS. bssgc

  • Digital IoT Tracking and Resource Management

    ISHELP.CO.UK LIMITED

    ISHelp provides a secure Internet of Things (IoT) Cloud/ICT system service via a secure digital system for the management, tracking and conditional monitoring of assets and equipment. The secure digital system delivered via a common operating picture approach provides operational understanding to enable effective decision making.

  • Cisco Umbrella Cloud Service

    QUADRIS LIMITED

    Cisco Umbrella secures your users internet access and controls cloud application usage across networks, branch offices, and roaming users. Cisco Umbrella delivers DNS-layer security, secure web gateway and firewall protection all delivered from a single cloud security service. The platform provides rapid protection to reduce phishing, malware and ransomware threats.

  • MTI Trend Micro Vision One

    MTI TECHNOLOGY LIMITED

    Cloud-native security operations platform, service cloud, hybrid, and on-premises environments, combines attack surface management (ASM) and extended detection and response (XDR) in one console to manage organisational cyber risk. Trend Micro Cloud One (Security, Conformity, Cloud Storage), Micro Network One (Discovery Inspector, Micro Workforce One (Smart Protection Complete), Micro XDR

  • Prisma Access

    LRQA

    Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.

  • Cylance - End Point AI Enabled Anti Virus Protection

    Grove Information Systems

    Cylance leverages AI to detect and prevent malware from executing in real time. By taking a mathematical approach to malware identification utilising patent-pending, machine learning techniques instead of reactive signatures and sandboxes, Cylance renders new malware, viruses, bots, and unknown future variants useless.

  • Check Point Harmony Browse

    INTEGRITY360 LIMITED

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.

  • Web Application Development

    JBi Digital

    JBi creates custom-built, interactive and secure cloud-based apps for your business that are completely bespoke and cost effective. Our collaborative, user-centred approach to web app development is driven towards bringing your organisation the best possible engagement and results with optimal technology.

  • ComplaintsPro

    FCS SOFTWARE SOLUTIONS LIMITED

    ComplaintsPro manages adult and child social care complaints; all types of corporate complaints; as well as FOI and SAR requests, enabling all complaints to be maintained in one place.

  • BT Managed Endpoint Security CrowdStrike

    BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY

    The BT Managed Endpoint Security CrowdStrike service utilises BT’s managed security services capability and CrowdStrike's EDR technology to provide customers with the capabilities to detect and prevent ransomware attacks, malware infections, and other advanced threats that target the security of customer's endpoints around the clock.

  • AI for Cybersecurity to Detect Threat Formation

    VE3 GLOBAL LTD

    The system proactively identifies emerging network threats such as DDoS attacks, web attacks, and brute force attempts, triggering alerts within security systems. It enhances security by offering a predictive strategy to preemptively counter the attack, thereby minimizing potential damage and ensuring robust system protection.

  • Armis Centrix

    INTEGRITY360 LIMITED

    Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security posture of devices connected to networks, ensuring strengthened defense against cyber-threats.

  • CHARMS

    SOCIAL CARE NETWORK SOLUTIONS LIMITED

    Children: front-door referral service, child protection, family hubs, care orders, Regional Adoption Agencies, prospective adopter assessment, adoption support, letterbox, fostering, foster carer recruitment, assessment, panel, payments, residential care, semi-independence, care leavers, supported living, Adults: shared lives, residential care, supported employment, Connect To Work, IPS, day care and domiciliary care.

  • Wordpress hosting

    SPINDOGS LTD

    Hosting of mobile optimised, accessible Wordpress content management system websites. Spindogs' Wordpress CMS platform provides bespoke templates for content editors. GDPR compliant Wordpress CMS has an easy to use admin interface and flexible content editing features. Wordpress content management system is open-source, user friendly, and fully customisable.

  • Privacy Management platform

    GET SWARMS LIMITED

    Our Privacy Management Platform centralizes organizational privacy office operations. Whether on cloud or on-premises, this tool aids GDPR compliance, managing tasks like data inventory, privacy impact assessments, breach notifications, subject access requests, and compliant workflows seamlessly.

  • Cloud Red Teaming Services

    SALUS DIGITAL SECURITY LIMITED

    Red Teaming is the process of using Tactics, Techniques, and Procedures (TTPs) to emulate a real-world threat with the goals of training and measuring the effectiveness of the people, processes, and technology used to defend an environment.

  • Microsoft Office 365

    SYNERGI SOFTWARE LIMITED

    Office 365 provides industry leading productivity and collaboration tools for Office based and remote workers. Delivering the power of cloud productivity to organisations of all sizes, combining Microsoft Office desktop suite with cloud-based versions of next-generation communications and collaboration services, including Exchange, SharePoint, Teams & OneDrive, MS Entra.

  • CheckPoint Harmony Browse

    BYTES SOFTWARE SERVICES LIMITED

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials. bssgc

  • CDW Cisco Secure Access Service Edge (SASE)

    CDW LIMITED

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • Computacenter - IBM Cloud Pak for Data

    COMPUTACENTER (UK) LIMITED

    IBM Cloud Pak for Data is a fully-integrated data and AI platform that modernizes how businesses collect, organize and analyze data to infuse AI throughout their organizations. It runs as a self-managed or fully-managed public cloud service on IBM Cloud with services and runtimes deployable to other cloud vendors.

  • Varonis SaaS Data Security Posture Management (DSPM)

    SOMERFORD ASSOCIATES LIMITED

    Varonis is a leader in data security. The cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, helps improve compliance and detects advanced threats with AI-powered automation. Helping to mitigate risk in M365 inc Co-Pilot, Windows file-shares, Active Directory and available on AWS Marketplace.