Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • IBM Analytics Engine

    IBM UNITED KINGDOM LIMITED

    Develop and deploy analytics applications using open source Apache Spark and Apache Hadoop. Customize the cluster using your own analytics libraries and open source packages. Integrate with IBM Watson Studio or third-party applications to submit jobs to the cluster.

  • Rapid7 Insight VM

    CHESS ICT LIMITED

    InsightVM provides a fully available, scalable, efficient way to collect vulnerability data, turn into answers, and minimize risk. InsightVM leverages latest analytics and endpoint technology to discover vulnerabilities in a real-time view, pinpoint their location, prioritize them, facilitate collaboration with other teams, and confirm your exposure has been reduced.

  • Check Point Harmony SASE

    LRQA

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • Thales HSM - Luna

    THALES UK LIMITED

    Thales Luna Cloud HSM is a cloud-based platform that provides a range of Cloud HSM and key management services through a simple online marketplace. With Cloud HSM security is made simpler, more cost-effective and easier to manage because there is no hardware to buy, deploy and maintain.

  • Rubrik

    SOFTCAT PLC

    Rubrik provides a zero trust data protection platform across all data and applications whether it be located on premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery, incident containment and Orchestrated Application Recovery all within a single management plane.

  • CDW Amazon AppStream 2.0

    CDW LIMITED

    Amazon AppStream 2.0 lets you move your desktop applications to AWS, without rewriting them. It’s easy to install your applications on AppStream 2.0, set launch configurations, and make your applications available to users.

  • Prolinx Assured Cloud (PAC), Prolinx Above Official Sensitive Collaborative Working Environment

    PROLINX LIMITED

    Prolinx Above Official Sensitive Collaborative Working Environment (CWE) is an assured, fully managed service including remote access, MS Office and collaboration tooling. This includes core Microsoft applications such as MS Outlook, Word, Excel, PowerPoint, OneNote, SharePoint/File Storage and a unified communications option.

  • CrowdStrike Falcon Complete MDR

    BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY

    Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.

  • ShadowDragon SocialNet and Horizon Software accessed via the Long Arm® Platform

    INTERNET INVESTIGATION SOLUTIONS LTD

    SocialNet® captures digital tracks, maps against their aliases, and explores connections in near real time to expedite your investigations and threat analysis. Horizon & SocialNet together has access to over 220 different open data sources throughout the internet. These include social networks, communication networks and other sites of common interest.

  • CDW Proofpoint Secure Email Relay

    CDW LIMITED

    Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.

  • Jamf Apple Device Management and Security Solution

    POSTREMO IT LIMITED

    Jamf simplifies Apple device management and security, offering streamlined deployment, secure access, and robust threat prevention. With user based licensing, organisations benefit from cost effective scalability and simplified management. Experience seamless Apple device management and enhanced security, ensuring optimal performance for end users and administrators

  • Check Point CloudGuard Network Security - For Azure Virtual WAN

    CHARTERHOUSE VOICE & DATA LIMITED

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.

  • Netskope - Web and Cloud Security

    BYTES SOFTWARE SERVICES LIMITED

    Cloud security platform designed to protect data and ensure security across cloud services and applications including Microsoft O365 or Zoom. It offers a range of features including real-time data and threat protection, data loss prevention (DLP), cloud access security broker (CASB) capabilities, and secure web gateway (SWG) functionality. bssgc

  • iProov Dynamic & Express Liveness

    IPROOV LIMITED

    Dynamic Liveness delivers a multi-frame face liveness with a patented, secure, passive challenge-response for industry-leading Presentation Attack Detection (PAD), Injection Attack Detection (IAD), and mitigation of advanced threats from deepfakes and generative AI. For lower-risk scenarios, Express Liveness delivers a near-instant multi-frame face capture with presentation and injection attack detection.

  • BeyondTrust Remote Support

    BYTES SOFTWARE SERVICES LIMITED

    BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices. bssgc

  • GRC & Security Assurance & Privacy - OneTrust

    RAZOR THORN SECURITY LTD

    OneTrust offers a comprehensive suite of solutions for trust and compliance, including privacy, security, data governance, and more. With over 12,000 clients worldwide, OneTrust helps organisations operationalise trust, simplify compliance with regulations such as GDPR, and streamline workflows through automation, ensuring data protection and risk management.

  • Broadcom/Symantec Email Threat Detection and Response (ETDR)

    GRADIAN SYSTEMS LTD

    Email Threat Detection and Response is an add-on to Symantec™ Email Security.cloud. Customers are protected from advanced malware and targeted attacks by leveraging the Global Intelligence Network, Heuristic technology, Attachment Sandboxing and protection against the weaponisation of URLs after delivery. ETDR delivers greater detail and context about the threats stopped.

  • CrowdStrike Falcon Data Protection

    INTEGRITY360 LIMITED

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • Barracuda Email Protection Premium

    PRIMESYS LTD

    Barracuda Email Protection Premium is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks.

  • Crowdstrike Falcon Identity Threat Detection & Protection

    SOFTCAT PLC

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • 2FA messaging

    BOOMERANG I-COMMS LTD

    Boomerang delivers a robust two-factor authentication (2FA) messaging service, bolstering account security with one-time passcode (OTP) verification. Our solution equips developers with seamless integration tools for heightened protection against unauthorized access. Leveraging Boomerang's platform fortifies accounts, reducing risks and ensuring compliance with ISO 27001, Cyber Essentials, and Cyber Essentials Plus.

  • Sophos Managed Detection and Response Essentials (MDR) Server

    SOFTCAT PLC

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Censornet Unified Security Service (Email, Web, CASB, MFA)

    NETWORK UTILITIES (SYSTEMS) LIMITED

    Web Security, Cloud Access Security Broker (CASB), Email Security, Compliant Email Archiving, and Multi-Factor Authentication on a single unified cloud hosted platform.

  • Sophos Central Intercept X Advanced with XDR and Managed Threat Response Standard

    INTEGRITY360 LIMITED

    Central Intercept X Advanced with Managed Threat Response (MTR) Standard is for organisations seeking the best protection coupled with the Sophos Managed Threat Response service. Includes all features in Central Intercept X Advanced with XDR plus 24/7 Threat Hunting, Adversarial Detections, Security Health Check, Data Retention, and Activity Reporting.

  • Tenable Lumin

    BYTES SOFTWARE SERVICES LIMITED

    Calculate, communicate and compare your cyber risk. bssgc

  • Castlepoint Manage Information Everywhere

    CASTLEPOINT SYSTEMS LIMITED

    Castlepoint reads, registers and regulates all information in a network, in any format and any system. It uses Explainable AI to automatically detect and classify high-risk and high-value information, and track what happens to it. It provides enterprise eDiscovery, privacy and security management, audit, records management, and Generative AI governance.

  • NowPrivacy

    Smartlytics Consultancy Limited

    NowPrivacy is a comprehensive data governance and management platform designed to empower organisations fully understand and control their data landscape. As data environments grow increasingly complex, NowPrivacy provides a robust solution to navigate, manage, and secure both unstructured and structured data, ensuring compliance and enhancing data privacy across the board.

  • Delinea Secret Server (Formerly Thycotic Centrify)

    ITHQ LTD

    Delinea Secret Server is a comprehensive Privileged Access Management (PAM) solution that securely manages and audits access to critical systems and data. It offers robust functionality including encrypted credential storage, session monitoring, role-based access controls, and compliance reporting, both in the cloud and on-premises. Remove complexity of legacy PAM solutions.

  • Forcepoint Zero Trust Content Disarm and Reconstruction (ZTCDR)

    GRADIAN SYSTEMS LTD

    ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.

  • Forcepoint Cloud Access Security Broker (CASB)

    Chess CyberSecurity Ltd t/a CyberLab

    Forcepint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and Information assurance restrictions on using the Cloud