Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Falcon Cloud Security

    PHOENIX SOFTWARE LIMITED

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • Check Point Harmony Endpoint

    ITogether

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • CloudHealth Secure State

    VE3 GLOBAL LTD

    CloudHealth Secure State is a sophisticated security and compliance monitoring platform designed for multi-cloud environments. It aids organizations in minimizing risk and safeguarding millions of cloud resources. By quickly identifying and rectifying security violations and promoting best practices, CloudHealth Secure State ensures that your cloud infrastructure remains secure and compliant

  • Druva Data Resiliency Cloud

    BYTES SOFTWARE SERVICES LIMITED

    Backup, archival, and compliance for Endpoint devices and cloud workloads. Simplify data protection, ensure regulatory compliance, eDiscovery and improve data visibility for your critical online data. bssgc

  • Cortex XDR

    LRQA

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivalled security and operational efficiency.

  • Computacenter - Palo Alto Cortex Xpanse

    COMPUTACENTER (UK) LIMITED

    Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services. Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.

  • SecurityRating.com: Vendor Risk Management Platform

    Lloyds Ventures

    SecurityRating.com: See your attack surface and third-party (vendor) risk with unrivalled clarity. Reduce your team’s workload with automation. Continuously monitor IT infrastructure. Get insights into vulnerabilities and threats, helping organisations manage risk and comply with regulations. Third-Party & Supply Chain Risk & Attack Surface Management made easy. Finally.

  • Computacenter - IBM DB2 Warehouse on Cloud

    COMPUTACENTER (UK) LIMITED

    IBM Db2 Warehouse on Cloud is A fully managed, elastic, cloud data warehouse built for high-performance analytics and machine learning available on IBM Cloud and AWS. It is part of Common SQL engine across all deployment options. IBM delivers an environment designed , managed and sized to meet those needs.

  • CDW Proofpoint Identity Threat Defense & Response (ITDR)

    CDW LIMITED

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Computacenter - ProofPoint Secure Email Relay

    COMPUTACENTER (UK) LIMITED

    Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.

  • Microsoft 365 Enterprise Desktop & Security Management

    FORDWAY SOLUTIONS LIMITED

    Fordway offer a comprehensive range of services ensuring best use of Microsoft 365 Enterprise Subscriptions, specifically E3, E5 and F1/F3, aligned to NCSC Blueprint, we can then maintain operational management and security for the environment.

  • DevOps, CloudOps and WebOps Engineering

    HENDERSON SCOTT LIMITED

    DevOps, CloudOps and WebOps services for Cloud users, ensuring applications are managed efficiently across the development lifecycle. Platforms: Windows, AWS, Azure, OpenStack, Linux. Tools: Splunk, Elastic Search, Chef, Puppet, Hiera, Xcat, Jenkins, Ansible, SaltStack, Git, Gradle, Travis, Mesos, Docker, Kubernetes, CoreOS, Rocket, Bamboo, VMWare, Vagrant

  • Check Point Harmony Mobile

    SAPPHIRE TECHNOLOGIES LIMITED

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • CrowdStrike Falcon® Counter Adversary Operations

    SOFTCAT PLC

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivalled expertise.

  • 247lib.com Library Management System for Health Libraries

    APPLIED NETWORK SOLUTIONS LIMITED

    247lib.com is a complete web library asset and online resource management system. 247lib.com is a health library management system. 247lib.com provides discovery portals, research portals, comprehensive search and easy management of resources on all devices. All applications are backed by full training, migration, implementation and support services.

  • Exabeam SaaS (SIEM)

    CYBANETIX LIMITED

    Exabeam SaaS Cloud keeps security management in the cloud, providing the full breadth of Exabeam’s SIEM collection, detection, investigation and response capabilities as a cloud-based service. Exabeam SaaS includes the following product offerings: Fusion Core, Fusion XDR, Fusion SIEM, Fusion Enterprise.

  • Managed Detection and Response Service

    TMC3 LIMITED

    tmc3's Managed Detection and Response (MDR) Service provides a fully outsourced 24/7x365 Managed Detection and Response SOC capability. We utilise technology platforms and experienced security analysts to provide a full MDR capability. Including SIEM, Threat Intelligence, Automation, Incident Management and Vulnerability Management. Monitoring and detection as a fully managed Service.

  • Proofpoint Core - P0 Bundle

    INTEGRITY360 LIMITED

    Resolve your email threats across attack chains, from detection to response. Automate abuse mailbox management by removing malicious user-reported phishing-emails. Address threats lik phishing, business email compromise (BEC), supplier fraud, ransomware/malware. Gain visibility into who's being attacked, how they're being attacked, whether they click on/report phishing and whether they're compromised

  • Echo Incident - incident management

    BIT ZESTY LIMITED

    EchoIncident is an incident management platform that helps tech-driven businesses manage incidents from the initial alert to post-mortem analysis and beyond, ensuring smooth operational continuity

  • Censornet Email Security (SEG)

    CM SECURITY LTD

    Censornet Secure Email Gateway is an email security solution designed to protect organisations from various email-borne threats such as spam, phishing attacks, malware, and data leaks. It acts as a gatekeeper for incoming and outgoing emails, ensuring that only legitimate and safe emails reach their intended recipients.

  • Fortinet Fortiweb WAF as a Service

    QUADRIS LIMITED

    FortiWeb WAFs provide advanced features that defend your web-applications and APIs from known and zero-day threats. Using an advanced multi-layered approach, FortiWeb protects against the OWASP Top 10 and more. FortiWeb customises the protection of each application, providing robust protection without requiring the time-consuming manual tuning required by other solutions.

  • Sophos Zero Trust Network Access (ZTNA)

    Chess CyberSecurity Ltd t/a CyberLab

    Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users.

  • CyberArk Endpoint Privilege Manager (EPM) SaaS

    SOFTCAT PLC

    CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.

  • Claroty xDome OT/IT Security

    BARRIER NETWORKS LIMITED

    Claroty xDome spans the entire cybersecurity journey, from empowering organisations with comprehensive OT (operational techncology) / ICS (Industrial Control Systems) asset visibility, identifying, measuring, and prioritising risk, to deploying Zero Trust-based protective controls, to optimising threat detection through a vast network of integrations. xDome is a modular SaaS platform.

  • Barracuda Email Protection Premium Plus

    PRIMESYS LTD

    Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks while also protecting data from accidental deletion and compliance via email archiving

  • Sophos Network Detection and Response

    CHESS ICT LIMITED

    Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • Microsoft Defender EDR Licences

    MONDAS CONSULTING LTD

    Purchase Microsoft Defender EDR licences to utilise the power of the Microsoft Defender Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Microsoft Defender EDR for signs of malicious activity on your network.

  • Zivver - Secure Email Platform

    ZIVVER LIMITED

    Zivver automates email security, allowing organisations to avoid data leaks and ensure compliant communications. Providing thousands of organisations worldwide with a native email security tool that combines; contextual AI-powered human error prevention, best-in-class AES 256-bit email encryption, recipient verification, email revocation, verified proof of delivery, 5TB file exchange and eSignatures.

  • UCD Strategy

    COGWORX LIMITED

    Understanding the drivers, emotions and challenges of your audience through to the practicalities of bringing a product or service to market.

  • Sophos Cloud Optix

    PHOENIX SOFTWARE LIMITED

    Sophos Cloud Optix, the Sophos Cloud Security Posture Management solution, proactively reduces business risk from unsanctioned activity, vulnerabilities, and misconfigurations across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform public cloud environments.