Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Check Point CloudGuard Web Application Firewall (WAF)

    INTEGRITY360 LIMITED

    Check Point CloudGuard WAF provides Web Application and API protection. With contextual analysis, it eliminates the tradeoff between security and complexity of managing application security. Whether your application is in a data center or public/private cloud, CloudGuard's innovative, decision engine covers, OWASP top ten attacks, API attacks. blocks automated attacks(Bots)

  • Property Management Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empowers users to have complete control of their property management cases. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • CDW Rubrik

    CDW LIMITED

    Rubrik provides a zero trust data protection platform across all data and applications whether located on premises or in the public, private or hybrid cloud. Rubrik provides Identity Recovery, Ransomware detection and remediation, Sensitive Data Discovery , Incident containment and Orchestrated Application Recovery all within a single management plane

  • Barrier Networks Crowdstrike Falcon Exposure Management

    BARRIER NETWORKS LIMITED

    CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Sophos Central Intercept X Advanced for Server

    CENTRAL NETWORKS AND TECHNOLOGIES LIMITED

    Central Intercept X Advanced for Server includes multiple policies, control capabilities (Web, Peripheral, Application, DLP), and threat cases. Cloud Security Posture Management (CSPM) service for AWS, Azure, and Google Cloud includes Inventory of cloud resources, identification of insecure workload configuration, suspicious access events, and unusual network traffic vulnerabilities.

  • Microsoft 365 (O365)

    EPIQ SYSTEMS, LTD.

    Microsoft 365 is a cloud based integrated Enterprise productivity application that helps transform the way organisations work. It enables employees to connect to people, collaborate, share content and information from any device and anywhere, whilst securely safeguarding organisations’ assets with intelligent security.

  • Lone Worker Employee Protection Services From Peoplesafe

    SEND FOR HELP LIMITED

    Lone worker services from Peoplesafe protect the largest share of public sector lone workers. Alarms raised through lone working devices, safety apps and body cameras are professionally managed by our 24/7/365 control centre. With Peoplesafe, you’ll know your staff can receive help whenever, wherever. Peoplesafe are people risk management specialists.

  • Jscrambler Webpage Integrity

    INTEGRITY360 LIMITED

    Jscrambler’s Webpage Integrity product mitigates threats/risks posed by third-party tags while ensuring compliance with PCI-DSSv4. With Jscrambler, businesses adopt a unified, future-proof client-side security policy all while achieving compliance with emerging security standards. Jscrambler serves a diverse range of customers, whose success depends on safely engaging with their customers online.

  • Sophos Managed Detection and Response Essentials (MDR) Endpoint

    Chess CyberSecurity Ltd t/a CyberLab

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Sophos Mobile

    SOFTCAT PLC

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • Tufin SecureChange+

    ITogether

    SecureChange+ delivers the compliance monitoring, policy management and risk mitigation that comes with SecureTrack+, as well as full-spectrum change design automation, rule lifecycle management and complete topology visibility.

  • Meraki SD WAN

    CENTRAL NETWORKS AND TECHNOLOGIES LIMITED

    Meraki SDWAN provides full mesh site-to-site IP connectivity across one or more Internet connections and allows granular control over traffic flows and link selection. One touch deployment simplifes large scale deployments into a quick and managable solution. Integrated firewall and content filtering solutions ensure a secure environment.

  • Fully Managed WiFi, Patient Engagement, Entertainment, Media and Fusion Solution

    SPARK TECHNOLOGY SERVICES LIMITED

    WiFi management, authentication, engagement and entertainment services. Filtered internet for staff, patients and visitors on tablets, BSUs and BYOD. Services are free including games, TV, magazines, nurse call, HL7 integration, meal ordering, signposting, surveys and analytics. Customisable, compliant, supported, monitored every day of the year with UK based telephone helpdesk.

  • Lookout Security Service Edge SSE - From HANDD Business Solutions

    HANDD BUSINESS SOLUTIONS LIMITED

    Data-centric cloud security for protecting corporate date in the cloud, on-premise, or on devices.

  • CrowdStrike Falcon Next Gen SIEM

    INTEGRITY360 LIMITED

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Microsoft SharePoint Consultancy & Development - AEMSP

    Telana Limited

    We provide consultancy for any form of SharePoint work. We provide guidance and best practice on all areas of the platform. This can include: training, custom development, identity management, security auditing, governance planning, data integration, search configuration, design & branding, migration support, user adoption planning, and more. .

  • Policing / Law enforcement / Cyber crime - Anomaly detection software

    ADAPPT LIMITED

    This service is based on our cyber crime software. Using Deep Learning insights, NLP and linguistic equations, our software tracks and identifies connections/relationship between users chat and message streams. User friendly data mining, analysis tools, provides intelligence led monitoring of activities of interest, with CPS compliant outputs.

  • Computacenter - CheckPoint Harmony SaaS

    COMPUTACENTER (UK) LIMITED

    Check Point Harmony SaaS is the most advanced solution for preventing SaaS-based threats. Harmony SaaS installs in minutes, continually reduces your attack surface and automatically prevents threats like data theft and account takeover. Automatically discover all your SaaS services, remediate security gaps, and maintain tight regulatory compliance with quick time-to-value.

  • Neo Technology Power Platform Solutions

    NEO TECHNOLOGY LIMITED

    Neo Technology's Power Platform Solutions empower users with a comprehensive suite of tools, including Power Apps, Power Automate, and Power BI, to streamline development processes and enhance data-driven decision-making. With seamless integration and advanced functionalities, businesses can leverage the full potential of the Power Platform to drive innovation and efficiency.

  • boxxe Palo Alto Prisma Cloud

    BOXXE LIMITED

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.

  • Sophos Intercept X Server

    PHOENIX SOFTWARE LIMITED

    Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.

  • Luciditi Age Assurance Service

    ARISSIAN LTD

    The Luciditi age assurance provides a digital solution for Age Assurance protecting minors from age restricted products and organisations from legal breaches. Solutions work in a face to face environment and or for access to online services.

  • Stone Digital Service Assurance Platform

    Stone Technologies Limited Trading as Converge Technology Solutions

    The Cisco ThousandEyes Cloud Service is a suite of cloud services designed to help measure/monitor the availability and performance of web applications, hosted services, and networks. The ThousandEyes internet and cloud intelligence platform expands visibility, insights, and action into digital delivery of applications and services over the internet and cloud.

  • BT Managed CrowdStrike Falcon XDR

    BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY

    The BT Managed CrowdStrike Falcon XDR service utilises BT’s managed security services capability and CrowdStrike's XDR technology to provide customers with the capabilities to detect and prevent ransomware attacks, malware infections, and other advanced threats around the clock. Starting with endpoints and servers and then extending to identity sources.

  • Cisco Meraki - Network, Security, CCTV & IoT Software

    RE-SOLUTION DATA LTD

    Cisco Meraki's Cloud Software Technology offers centralised management of network infrastructure via cloud-based platform, enabling remote configuration, monitoring, and troubleshooting with ease. Organisations are easily able to centrally manage and control their Switches, Firewalls, Wireless Access Points, CCTV Cameras and IoT Sensors.

  • Umbraco consultancy

    SPINDOGS LTD

    Consultancy for Umbraco CMS mobile optimised, accessible websites. Spindogs' Umbraco CMS platform provides bespoke templates for content editors. GDPR compliant Umbraco CMS forms and tagging are out-of-the-box. Umbraco CMS offers version control, integrations, SSO, and multilingualism. Umbraco content management system is open-source, user friendly, and fully customisable.

  • DevSecOps Training

    CAPGEMINI UK PLC

    Capgemini’s DevSecOps Training service provides an online service that can offer interactive training including coding labs, tournaments and assessments to help drive culture change, engage, and help developers improve their secure coding skills. The service empowers developers to enhance their coding skills in fostering a resilient and security-oriented environment.

  • Microsoft Cloud Solutions Supplier (CSP)

    ALTIATECH LTD

    Altiatech deliver the full stack of Microsoft products, services and Azure Cloud, ranging from license optimisation to full user adoption. Our expertise offers end-to-end support with license selection, configuration, migration and training to unlock productivity and security benefits. Altiatech is a Microsoft Gold Partner with expertise in several disciplines.

  • Barracuda Email Protection Advanced

    PRIMESYS LTD

    Barracuda Email Protection Advanced is a comprehensive email security protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks.

  • Sophos Managed Detection and Response Essentials (MDR) Server

    Chess CyberSecurity Ltd t/a CyberLab

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.