Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1734 results found

1734 results found in Lot 2: Cloud software in the category Security risk management

  • boxxe Cloudflare Zero Trust Network Access

    BOXXE LIMITED

    Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.

  • Axonius

    THEIMPACT.TEAM LIMITED

    The Axonius Platform is the system of record for all digital infrastructure to let IT and security teams understand all assets, their relationships, and business-level context. Customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy, all while eliminating manual, repetitive tasks.

  • CDW Cloudflare Cloud Email Security

    CDW LIMITED

    Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.

  • Tadaweb

    Tadaweb

    Tadaweb's operating system for OSINT streamlines open-source investigations. Optimising data collection, analysis and internet investigations. Features include efficient information gathering, persistent monitoring, protection of data, secure working environment and adherence to policy. The platform supports collaborative work, access to publicly and commercially available information and the generation of actionable insights.​

  • Splunk Data Platform

    NETWORKOLOGY LTD

    Splunk monitors and analyses data from any sources to optimise your IT, security and business performance through operational intelligence and insights. This offering includes Enterprise, Clouds, Enterprise Security (SIEM), SOAR (Orchestration), IT Service Intelligence (ITSI), Observability (APM), and Splunk's Edge Hub solution.

  • CrowdStrike Falcon Exposure Management

    SOFTCAT PLC

    CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Palo Alto Cortex Xpanse

    BYTES SOFTWARE SERVICES LIMITED

    Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services. Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams. bssgc

  • Crowdstrike Falcon Exposure Management Licences

    MONDAS CONSULTING LTD

    Purchase Crowdstrike Falcon Exposure Management licences to utilise the power of the Crowdstrike Falcon Exposure Management AI- powered platform for vulnerability management. Crowdstrike Falcon Exposure Management helps security teams complete vulnerability management programs through the entire lifecycle.

  • Microsoft Dynamics365 ERP Cloud Advisory Services with Cloud Implementation/Testing/Roll out/Support

    INFOSYS LIMITED

    Microsoft Dynamics 365 ERP Cloud Advisory is an end to end service for cloud readiness assessment, fit-gap analysis for cloud implementation, Integration and optimisation services for Microsoft Dynamics 365 ERP cloud implementation.

  • Mimecast - Email Security, Archiving, Continuity and Anti Phishing Training

    Grove Information Systems

    Mimecast Unified Email Management and Cyber Resilience platform is an always-on, cloud-based service that offers organisations the unique benefits of fully integrated email security, business and operations-critical cyber continuity; and archiving solutions.

  • Lookout Mobile Endpoint Detection & Response EDR - From HANDD Business Solutions

    HANDD Business Solutions

    Scalable, unified Mobile Endpoint Detection and Response platform to protect managed or unmanaged IOS, Android and Chrome OS devices. The platform is powered by telemerty from hundreds of millions of mobile application, devices and web items to detect mobile compromise and phishing attacks.

  • CDW Amazon WorkSpaces

    CDW LIMITED

    Amazon WorkSpaces offers you an easy way to provide a secure, managed, cloud-based virtual desktop experience to your end-users. Amazon WorkSpaces provides a fully managed service. With Amazon WorkSpaces, you can deliver a high-quality portable desktop, and applications, to your users on the device of their choice.

  • Check Point Harmony Mobile

    INTEGRITY360 LIMITED

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • Protective DNS and content filtering

    ITHQ LTD

    DNSFilter provides protective DNS and content filtering services, blocking malicious sites and inappropriate content at the DNS level. It features easy policy creation, roaming client support, and flexible deployment options, suitable for diverse environments including remote work settings.

  • Tenable One - Enterprise

    SOFTCAT PLC

    Tenable One Enterprise is comprised of all features in Tenable One Standard plus: Attack Path Analysis for breach & attack mitigation and External Attack Surface Management for insight into the external attack surface, allowing organizations to identify and reduce risks from the attacker’s perspective.

  • SolarWinds Access Rights Manager (ARM) license

    Prosperon Networks Ltd

    SolarWinds® Access Rights Manager (ARM) is designed to assist IT and Security Administrators to quickly and easily provision, de-provision, manage and audit user access rights to systems, data, and files. ARM helps to protect organisations from the potential risks of data breaches, and demonstrate regulatory compliance.

  • Micro Focus, now OpenText - Identity Governance (IG) on SaaS

    MICRO FOCUS

    Micro Focus Identity Governance helps organizations run effective access certification campaigns and implement identity governance controls to meet compliance mandates while proactively mitigating risk. Get organizations up and running in hours Identity Governance replaces error-prone, timeconsuming manual methods that can expose organizations to compliance violations and risk from excessive access.

  • Kiosk design and development

    MTC MEDIA LIMITED

    mtc provides a full service digital design and development service agency providing a range of specialist services. Our kiosk user interface design and development service is aimed at independent theatre, cinema, and visitor attractions, using Spektrix as their ticket fulfilment and CRM software provider.

  • IBM DB2 Warehouse on Cloud

    IBM UNITED KINGDOM LIMITED

    IBM Db2 Warehouse on Cloud is A fully managed, elastic, cloud data warehouse built for high-performance analytics and machine learning available on IBM Cloud and AWS. It is part of Common SQL engine across all deployment options. IBM delivers an environment designed , managed and sized to meet those needs.

  • Cynet360

    INTEGRITY360 LIMITED

    Cynet 360 is the world’s first autonomous breach protection platform that consolidates and automates Monitoring & Control, Attack Prevention & Detection and Response Orchestration a Cynet 360 delivers these capabilities by use of Cynet Sensor Fusion™ to collect and analyze all endpoint, user, file, network activities across the environment.

  • CheckPoint - CloudGuard Cloud Security Posture Management

    VE3 GLOBAL LTD

    VE3 offers comprehensive security, governance, and compliance automation tailored for public clouds and Kubernetes environments. Our solution provides continuous visibility and control, empowering organizations to reduce their attack surface and defend against vulnerabilities, identity theft, and data loss within cloud environments.

  • Netwrix Endpoint Protector

    BYTES SOFTWARE SERVICES LIMITED

    oSoSys offers a rich portfolio of security products and features for device control, data loss prevention (DLP), and eDiscovery for Windows, macOS and Linux, as well as the development of applications for portable storage device encryption and enhancement. Endpoint Protector is a dedicated DLP solution with a server/client architecture.  bssgc

  • Prisma Cloud

    LRQA

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.

  • COOLSPIRiT a Databarracks Company: Arctic Wolf Managed Security Operations

    COOLSPIRiT, a Databarracks company

    Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response

  • Portnox

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Portnox provides comprehensive network access control solutions designed to secure organisations against cybersecurity threats by managing and monitoring every connected device in real time. It offers visibility, control, and policy enforcement across your network, ensuring secure access and compliance with IT and regulatory standards.

  • Broadcom/Symantec Email Security Service (ESS)

    Gradian Systems Ltd

    Email security service filters unwanted messages and protects your mailboxes from targeted attacks. The service has self-learning capabilities enriched with Symantec intelligence to deliver highly effective and accurate email security. Encryption and data loss prevention help you control sensitive data.

  • Enterprise Password Management - in partnership with Bitwarden

    QNETIX LTD

    A majority of hacking-related breaches succeed through stolen or weak passwords. Empower employees to generate strong, unique passwords and share them securely whilst keeping all business passwords and other sensitive information in an end-to-end encrypted vault.

  • CDW Proofpoint P0 Bundle

    CDW LIMITED

    Proofpoint P0 bundle includes Email Protection, Targeted Attack Protection (TAP) and Threat Response Auto Pull (TRAP). The Secure Email Gateway includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP sandboxes attachments and URLs. TRAP Security Orchestration Automation Response for email removes malicious, delivered messages from inboxes.

  • Mimecast Cyber Resilence Pro Plan

    QUADRIS LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • LexisNexis® ThreatMetrix

    LEXISNEXIS RISK SOLUTIONS UK LIMITED

    ThreatMetrix provides best-in-class fraud, identity and authentication services to help digital businesses better distinguish good customers from potential fraudsters in real time, without adding unnecessary friction. Leveraging global intelligence from the Digital Identity Network, ThreatMetrix enables businesses to make more informed fraud and risk decisions.