Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1553 results found

1553 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Proofpoint Core - P0 Bundle

    INTEGRITY360 LIMITED

    Resolve your email threats across attack chains, from detection to response. Automate abuse mailbox management by removing malicious user-reported phishing-emails. Address threats lik phishing, business email compromise (BEC), supplier fraud, ransomware/malware. Gain visibility into who's being attacked, how they're being attacked, whether they click on/report phishing and whether they're compromised

  • Echo Incident - incident management

    BIT ZESTY LIMITED

    EchoIncident is an incident management platform that helps tech-driven businesses manage incidents from the initial alert to post-mortem analysis and beyond, ensuring smooth operational continuity

  • Censornet Email Security (SEG)

    CM Security Ltd

    Censornet Secure Email Gateway is an email security solution designed to protect organisations from various email-borne threats such as spam, phishing attacks, malware, and data leaks. It acts as a gatekeeper for incoming and outgoing emails, ensuring that only legitimate and safe emails reach their intended recipients.

  • Fortinet Fortiweb WAF as a Service

    QUADRIS LIMITED

    FortiWeb WAFs provide advanced features that defend your web-applications and APIs from known and zero-day threats. Using an advanced multi-layered approach, FortiWeb protects against the OWASP Top 10 and more. FortiWeb customises the protection of each application, providing robust protection without requiring the time-consuming manual tuning required by other solutions.

  • Sophos Zero Trust Network Access (ZTNA)

    Cyberlab

    Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users.

  • CyberArk Endpoint Privilege Manager (EPM) SaaS

    SOFTCAT PLC

    CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.

  • Claroty xDome OT/IT Security

    Barrier Networks

    Claroty xDome spans the entire cybersecurity journey, from empowering organisations with comprehensive OT (operational techncology) / ICS (Industrial Control Systems) asset visibility, identifying, measuring, and prioritising risk, to deploying Zero Trust-based protective controls, to optimising threat detection through a vast network of integrations. xDome is a modular SaaS platform.

  • Barracuda Email Protection Premium Plus

    PRIMESYS LTD

    Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks while also protecting data from accidental deletion and compliance via email archiving

  • Sophos Network Detection and Response

    CHESS ICT LIMITED

    Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • Microsoft Defender EDR Licences

    MONDAS CONSULTING LTD

    Purchase Microsoft Defender EDR licences to utilise the power of the Microsoft Defender Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Microsoft Defender EDR for signs of malicious activity on your network.

  • Zivver - Secure Email Platform

    ZIVVER

    Zivver automates email security, allowing organisations to avoid data leaks and ensure compliant communications. Providing thousands of organisations worldwide with a native email security tool that combines; contextual AI-powered human error prevention, best-in-class AES 256-bit email encryption, recipient verification, email revocation, verified proof of delivery, 5TB file exchange and eSignatures.

  • UCD Strategy

    COGWORX LIMITED

    Understanding the drivers, emotions and challenges of your audience through to the practicalities of bringing a product or service to market.

  • Sophos Cloud Optix

    PHOENIX SOFTWARE LIMITED

    Sophos Cloud Optix, the Sophos Cloud Security Posture Management solution, proactively reduces business risk from unsanctioned activity, vulnerabilities, and misconfigurations across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform public cloud environments.

  • IBM Analytics Engine

    IBM UNITED KINGDOM LIMITED

    Develop and deploy analytics applications using open source Apache Spark and Apache Hadoop. Customize the cluster using your own analytics libraries and open source packages. Integrate with IBM Watson Studio or third-party applications to submit jobs to the cluster.

  • Rapid7 Insight VM

    CHESS ICT LIMITED

    InsightVM provides a fully available, scalable, efficient way to collect vulnerability data, turn into answers, and minimize risk. InsightVM leverages latest analytics and endpoint technology to discover vulnerabilities in a real-time view, pinpoint their location, prioritize them, facilitate collaboration with other teams, and confirm your exposure has been reduced.

  • Check Point Harmony SASE

    LRQA

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • Thales HSM - Luna

    THALES UK LIMITED

    Thales Luna Cloud HSM is a cloud-based platform that provides a range of Cloud HSM and key management services through a simple online marketplace. With Cloud HSM security is made simpler, more cost-effective and easier to manage because there is no hardware to buy, deploy and maintain.

  • Rubrik

    SOFTCAT PLC

    Rubrik provides a zero trust data protection platform across all data and applications whether it be located on premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery, incident containment and Orchestrated Application Recovery all within a single management plane.

  • CDW Amazon AppStream 2.0

    CDW LIMITED

    Amazon AppStream 2.0 lets you move your desktop applications to AWS, without rewriting them. It’s easy to install your applications on AppStream 2.0, set launch configurations, and make your applications available to users.

  • Prolinx Assured Cloud (PAC), Prolinx Above Official Sensitive Collaborative Working Environment

    Prolinx Ltd

    Prolinx Above Official Sensitive Collaborative Working Environment (CWE) is an assured, fully managed service including remote access, MS Office and collaboration tooling. This includes core Microsoft applications such as MS Outlook, Word, Excel, PowerPoint, OneNote, SharePoint/File Storage and a unified communications option.

  • CrowdStrike Falcon Complete MDR

    BT PLC

    Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.

  • ShadowDragon SocialNet and Horizon Software accessed via the Long Arm® Platform

    Internet Investigation Solutions Ltd

    SocialNet® captures digital tracks, maps against their aliases, and explores connections in near real time to expedite your investigations and threat analysis. Horizon & SocialNet together has access to over 220 different open data sources throughout the internet. These include social networks, communication networks and other sites of common interest.

  • CDW Proofpoint Secure Email Relay

    CDW LIMITED

    Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.

  • Jamf Apple Device Management and Security Solution

    POSTREMO IT LIMITED

    Jamf simplifies Apple device management and security, offering streamlined deployment, secure access, and robust threat prevention. With user based licensing, organisations benefit from cost effective scalability and simplified management. Experience seamless Apple device management and enhanced security, ensuring optimal performance for end users and administrators

  • Check Point CloudGuard Network Security - For Azure Virtual WAN

    Charterhouse Voice & Data

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.

  • Netskope - Web and Cloud Security

    BYTES SOFTWARE SERVICES LIMITED

    Cloud security platform designed to protect data and ensure security across cloud services and applications including Microsoft O365 or Zoom. It offers a range of features including real-time data and threat protection, data loss prevention (DLP), cloud access security broker (CASB) capabilities, and secure web gateway (SWG) functionality. bssgc

  • iProov Dynamic & Express Liveness

    iProov Limited

    Dynamic Liveness delivers a multi-frame face liveness with a patented, secure, passive challenge-response for industry-leading Presentation Attack Detection (PAD), Injection Attack Detection (IAD), and mitigation of advanced threats from deepfakes and generative AI. For lower-risk scenarios, Express Liveness delivers a near-instant multi-frame face capture with presentation and injection attack detection.

  • BeyondTrust Remote Support

    BYTES SOFTWARE SERVICES LIMITED

    BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices. bssgc

  • GRC & Security Assurance & Privacy - OneTrust

    RAZOR THORN SECURITY LTD

    OneTrust offers a comprehensive suite of solutions for trust and compliance, including privacy, security, data governance, and more. With over 12,000 clients worldwide, OneTrust helps organisations operationalise trust, simplify compliance with regulations such as GDPR, and streamline workflows through automation, ensuring data protection and risk management.

  • Broadcom/Symantec Email Threat Detection and Response (ETDR)

    Gradian Systems Ltd

    Email Threat Detection and Response is an add-on to Symantec™ Email Security.cloud. Customers are protected from advanced malware and targeted attacks by leveraging the Global Intelligence Network, Heuristic technology, Attachment Sandboxing and protection against the weaponisation of URLs after delivery. ETDR delivers greater detail and context about the threats stopped.