Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1704 results found

1704 results found in Lot 2: Cloud software in the category Security risk management

  • HYDRAX Secure Mobile Device Management Service

    Phonehub IO Ltd

    Hydrax is a cloud managed, ultra-secure locked-down operating system for mobile devices such as tablets and phones, enabling them to be used by prisoners and prison staff in custodial environments without the risk of abuse. It has been fully penetration tested and deemed fit for use in prisons.

  • Logit.io Logging as a Service and Observability

    Logit.io

    The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • F5 BigIP VE Distributed Cloud, Silverline/App Protect, Nginx & Evolve Support

    BlueFort Security Ltd

    F5 Licensing to facilitate Local /Global Load Balancing / Access Policy Manager (VPN) /Advanced Firewall Manager / DNS / App Security Manager / Big IQ Management/Waap/F5 Distributed Cloud Services Essential App Protect & Nginx sundry services to support installation / training.

  • boxxe Sophos Intercept X Advanced with XDR

    BOXXE LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Palo Alto Prisma Cloud

    Softcat Limited

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multi-cloud environments.

  • Palo Alto Networks Cyber Security by ITGL

    ITGL Limited

    Services to cover all Palo Alto Security Products including NGFW Firewalls, IPS, Panorama, Cortex XDR, Cortex XSOAR, DNS Security, Prisma Access, Prisma SASE, Prisma Cloud, Enterprise DLP.  Assistance towards achieving Cyber Essentials accreditation.

  • KickSecure Managed Patching and RMM Services as a Service

    Kick ICT

    An experienced and trusted provider of datacentre services, we made a significant investment to upgrade our datacentre in 2019, delivering a state of the art, fully managed Nutanix hyper converged infrastructure hosting solution for our customers, with all the security and accessibility benefit this brings.

  • Entity Resolution Driven Data Analysis And Exploitation Service

    DATA-EDGE ANALYTICS LTD

    The service provides a single view of an entity. It resolves entities (organisations/people/objects) from records, at scale, in real time, with full 'explainability'. The system incorporates data transformation, pipelines, ingestion, storage, alerting, entity analysis, graphing and visualisation tools for users. The system feeds downstream analysis systems.

  • High-Threat coc00n Device Protection

    COC00N CYBER LIMITED

    coc00n High Threat Deployment is a premier cybersecurity solution specifically designed for individuals operating in high information risk environments. The solution leverages advanced technical products to provide round-the-clock protection for personal devices, safeguarding against sophisticated cyber threats that target physical safety, data security, and personal privacy.

  • MTI Palo Alto Networks

    MTI Technology Ltd

    (Palo Alto Networks Cortex XSOAR), (Palo Alto Networks Cortex XDR), (Palo Alto Networks Prisma Cloud), (Palo Alto Networks Prisma SaaS), (Palo Alto Networks VM-Series Next-Generation Firewalls). Palo Alto Networks offers an enterprise cybersecurity platform which provides network security, cloud security, endpoint protection, and various cloud-delivered security services.

  • Guardicore Software Defined Segmentation Managed Service

    BLOCKPHISH

    The Guardicore Centra Security Platform allows you automatically visualise your entire data centre environment, map application dependencies and flows to identify security gaps, and create policies based on asset classification, including AI-powered templates, reducing your attack surface and minimising the risk of Ransomware

  • Crowdstrike Falcon Next gen SIEM Licences

    MONDAS CONSULTING LTD

    Purchase Crowdstrike Next Gen SIEM licences to utilise the power of Crowdstrike to collate log data from all of your security stack and generate alarms for a SOC team to triage. Crowdstrike Next Gen SIEM can remediate these alarms using powerful automated playbook actions.

  • Tessian ICES

    INTEGRITY360 LIMITED

    Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • Delinea Platform - Privileged & Identity Access Management (PIM & PAM)

    Barrier Networks

    Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.

  • Micro Focus, now OpenText - OpenText Core IAM Foundation on SaaS

    MICRO FOCUS

    OpenText Core IAM Foundation provides essential Identity and Access Management capabilities that organizations need to support a secure IAM program. The OpenText Core IAM Foundation provides: • Identity Governance • Advanced Authentication Limited – a Multi-Factor Authentication (MFA) framework • Password Management • Identity Intelligence Basic

  • Logpoint Converged SIEM and SOAR

    Armadillo Sec Ltd

    Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. Providing a comprehensive and centralised view of the security posture of an IT infrastructure.

  • Centerprise Email Archiving Solution by TitanHQ

    Centerprise International Ltd

    Centerprise Email Archiving solution by TitanHQ (ArcTitan) archives email securely allowing for lightening fast search and retrieval. ArcTitan includes full email audit functionality, guaranteeing that emails have not been altered. Compliant with GDPR, eDiscovery, Sarbanes–Oxley, HIPPA, and other legislation for e-discovery, retention and audit

  • e2e Vulnerability Scanning Service

    e2e-assure Ltd

    Find vulnerabilities in your external-facing services - before attackers do. Simple to scale and customise for specific installations, our External Vulnerability Scanning Service enables you to take informed decisions about your external infrastructure.

  • CDW AvePoint EnPower for Microsoft 365

    CDW Limited

    As appetites continue to grow to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft365. AvePoint EnPower equips IT teams to pivot as needs and requirements change without worrying about what model makes sense in that moment.

  • Egress Defend - Integrated Cloud Email Security

    S3 Ltd

    Egress Defend is Intelligent Cloud Email Security. It protects against data breaches by reducing human activated risk. Intelligent technologies using AI detect sophisticated phishing attacks, including BEC compromise and account takeover and engage users with contextual, colour-coded warnings embedded in suspicious emails.

  • Identity and access management (IDAM)

    Zaizi Limited

    Zaizi designs, implements and supports Identity and Access Management solutions using enterprise-grade and open source: Including Keycloak, Redhat, Amazon Cognito, Okta, Microsoft AD and other Cloud based SSO and Multi Factor Authentication (MFA) solutions. We provide skills and advice guiding you from discovery through to implementation.

  • Human Risk Management & Mitigation, Phishing Simulation, Security Awareness Training & DMARC

    Lloyds Ventures

    HumanFirewall measures, manages and mitigates risk at the Human Layer. Platform uses automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks. EmailAuth enables Brand-Protection, Anti-Spoofing and Enhances Email-Deliverability using DMARC, SPF, DKIM, MTA-STS, TLS-RPT & BIMI.

  • Aiimi Insight Engine – Migration

    Aiimi Ltd

    Insight Engine provides extensive automation to support your migration activities, whether these are simple cloud migrations or more complex content management migrations between systems such as File Shares, Cloud Storage, SharePoint, Cloud Storage or OpenText Content Server. Rules based migrations can take advantage of the extensive metadata extraction routines provided.

  • Incident Management Solution

    GET SWARMS LIMITED

    Our Incident Management Solution is a systematic approach to identifying, responding to, and resolving unexpected events or disruptions within an organization. It involves processes and tools for promptly addressing incidents, minimizing their impact on operations, and restoring normalcy. Swarms goal is to ensure business continuity, minimize downtime, and mitigate risks.

  • Tenable PCI-ASV

    Phoenix Software Ltd

    Unlimited comprehensive scans identify and address vulnerabilities, ensuring PCI DSS compliance. The Tenable PCI ASV process follows strict guidelines, preventing vulnerabilities on payment card transaction networks for more than 90 days. This user guide assists with navigating the entire Tenable PCI ASV process

  • Check Point CloudGuard Web Application Firewall as a Service (WAFaaS)

    Softcat Limited

    Web Application and API protection. With deep application contextual analysis, eliminates the trade-off between level of security and complexity of managing application security. Whether application is hosted in data centre or in a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks, blocks automated attacks (Bots)

  • IBM Watson Query

    IBM United Kingdom Ltd

    IBM Watson Query allows you to query data across many systems without having to copy and replicate it, saving time and reducing costs. Watson Query queries data from its source, simplifying your analytics by providing the latest and most accurate data.

  • Azure Virtual Desktop Solution

    DO Business Services Limited

    Azure Virtual Desktop enables users to securely use the applications, files and services in their work environment without exposing the systems to Cyber Security threats. Only a web browser is required or for a richer experience the Microsoft Remote Desktop tool. Enabling a mobile workforce is now simple and secure.

  • Dell PowerProtect DD Virtual Edition

    Phoenix Software Ltd

    A software-defined, immutable data protection and cyber recovery solution from Dell's PowerProtect DD series, also known as Dell Data Domain Virtual Edition - DDVE. Allows fast and flexible deployments for backup and disaster recovery solutions in cloud and hybrid environments.

  • Palo Alto Networks Cortex XSOAR

    Khipu Networks Limited

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.